CYBER Insights » CYBER INSIGHTS: Friday 17 May 2024 – Today’s SME Cybersecurity News & Intelligence

CYBER INSIGHTS: Friday 17 May 2024 – Today’s SME Cybersecurity News & Intelligence

Image Credit: IfOnlyCommunications | Cybersecurity Journalist, Cyber Insights, SME Cybersecurity News,
Image Credit: IfOnlyCommunications

Gibraltar: Friday 17th May 2024 at 07:00 CET

CYBER INSIGHTS: The Latest SME Cybersecurity News & Intelligence …
Written & Curated By Iain Fraser – Cybersecurity Journalist,
IainFRASER.net/CYBERInsights
SME Cyber Insights
Google Indexed 170524 at 07:45 CET

#SMECyberInsights #SMECybersecurityNews 

Welcome to Today’s Edition of CYBERInsights – My Daily Roundup of the Latest European SME Cybersecurity News including: 1). Introducing  CybAid 2). UK Cyber Security Breaches Survey  3). MFA/2FA Explained

Image Credit: Succo/Pixabay
Image Credit: Succo/Pixabay

1). CYBAID – An unsung hero championing the Charity & SME sectors. I was only made aware of CyBAid late last year, this led to my usual research and a voyage of discovery that unearthed what is indeed a fantastic initiative. Simply CybAid is a Platform that connects Pro-Bono Cyber Pros with Charities and Small Businesses (SMEs). Committed to offering complimentary Cyber Consultancy services to industries dedicated to aiding others. Click below to learn more about CybAid.

2). UK Cyber Security Council, Chair Andy Jones has responded to a request by the #CyberUp Campaign to comment on the findings of the UK Government’s Cyber Security Breaches Survey the annual official statistic detailing the cost and impact of cyber breaches attacks on businesses, charities and educational institutions across the UK, first published last month. Andy, a passionate supporter of the #CyberUp Campaign. Click on Learn More below to read his opinion piece.

3). WHAT IS MFA (2FA) Cyber KPI’s: What is Multi Factor Authentication (2 Factor Authorisation) and why should SMEs use it? Multi-factor authentication (MFA; two-factor authentication, or 2FA) is a multi-step account login process that requires users to enter more information than just a password. For example, along with the password, users might be asked to enter a code sent to their email, answer a secret question, or scan a fingerprint.

Cybersecurity Journalist, Daily Cyber Insights, SME Cybersecurity,

ABOUT IAIN FRASER – I am a Gibraltar based, Accredited, Professional  Journalist, (*NUJ, IFJ & ONA) Authority Writer, Industry Influencer & Commentator on all aspects of Cybersecurity [Awareness, Threat Management, Best Practice Compliance & Mitigation] and report throughout Europe.

I also cover the sectors where I have either operational experience or subject matter expert knowledge including: Geopolitics esp. Geocrime, Defence Technology, AI, Autonomous Transport & National Security and contribute to a broad range of European facing news channels, blogs and digital magazines as either Guest Feature Writer, Columnist or Consultant Editor. Email: [email protected] | LinkedIn Bio: IainFraserJournalist

Leave a Reply

Your email address will not be published. Required fields are marked *

Translate »