Fraudulent VC Emails Targeting Finance Departments

We’ve been made aware of a couple of University finance departments having received fraudulent email requests.   The requests advise that the vice-chancellor required assistance with a money transfer or purportedly from the vice-chancellor at their institution asking for assistance with … Continue reading

Posted in Current Threats, Information Security | Comments Off

Open Heart(bleed) Surgery

If you haven’t heard by now of the so-called “Heartbleed” Internet security bug that last week sent the Internet security community into something of a frenzy, then you probably don’t need to worry and almost certainly won’t be reading this! … Continue reading

Posted in Information Security | Comments Off

Aaaarrrggghhhh – ye be hacked!

Ahoy me hearties! Talk like a pirate day it may be but thar be good reasons why it’s not a good idea t’ act like one online.  Pillagin’ the Internet for booty might seem attractive t’ some bilge-sucking scallywags and … Continue reading

Posted in Information Security | 1 Comment

To Phish or Not to Phish? Part 2

That is the question……. Part 1 of this blog post gave a summary of some of the issues we face when trying to detect, prevent and respond to phishing attacks.  The upshot is that it isn’t easy.  Technical controls are … Continue reading

Posted in Information Security | 11 Comments

To Phish or Not To Phish? Part 1

That is the question……. About eighteen months ago I wrote a blog post on the price of phish.  Since then, phishing has continued not only to remain a problem but to grow as a significant threat to aspects of the University’s … Continue reading

Posted in Information Security | 4 Comments

Information Security Policy – So What?

In July 2012 the University Council officially approved a new information security policy but what does this mean in practical terms?  Well, for a start, it means that each University department must formulate their own information security policy and it … Continue reading

Posted in Information Security | 1 Comment

BYOD: Major Risk or Latest Bandwagon?

Go to any security event these days and you will find any number of information security managers, vendors or company directors all nodding in agreement that mobile devices and bring your own device (BYOD) are one of the current  big … Continue reading

Posted in Information Security | Comments Off