It’s an old one but a good one. Protecting you kids online

youtube.com/watch

I think it is time to update the Rabbit to the new OS, looks interesting. Hopefully, it will move me away from using it as a paper weight!

Interesting read for a Sunday - Fugitive, Traitor, Soldier or Spy - www.gq-magazine.co.uk/article/d…

The NCSC encourages collaboration between quantum and cyber sectors to shape secure architectures for future quantum networks, aligning with the UK’s 2035 quantum mission goals - NCSC

Can the EU break free from American tech companies ? In the FT

NCSC UK updates - “How to identify and protect against the risks associated with sensitive personal information in your data holdings.

M&S calls for mandatory ransomware reporting | Computer Weekly

Marks & Spencer chairman Archie Norman has described the recent ransomware attack on the retailer’s systems as something akin to an “out-of-body experience” as he called for cyber attack victims to be brave, bite the bullet, and be open and transparent about their experiences.

Open letters to Third Party Suppliers

It has been a couple of weeks of open letters to suppliers :

NHS published its request and TOR

JP Morgan open letter

The stolen iPhone market

Inside the Stolen iPhone Market 📲

it is one of the most important nodes in a supply chain for second-hand technology that starts in the west, travels through wholesalers in Hong Kong and on to markets in mainland China and the global south.

Guidelines for secure AI design and development

Guidelines for providers of AI systems, whether custom-built or built on top of external tools and services. NCSC guidelines

Defending Against UNC3944 AKA Scattered Spider

Defending Against UNC3944 AKA Scattered Spider

To counter UNC3944, organizations need robust defenses involving identity verification and advanced authentication methods. Implementing phishing-resistant multi-factor authentication (MFA), minimizing reliance on SMS for authentication, and eliminating publicly available personal data verification are practical steps. Secure the identity verification process with methods like on-camera checks to thwart impersonation attempts.

Training staff to identify and respond to unusual IT requests is crucial. This includes understanding ploys like fake IT calls, email phishing attempts, and odd requests for credential verification, which are characteristic of UNC3944 operations.

Original article by Google

A lot of customers will be watching to see what happens with Tata after being linked to another beach - M&S

Original Post from the FT