🗳️ Vote for us on PodRadar Security Theatre Exposed — Passkeys, the CISA Leak & Your Cyber Insurance Vote now →

All Articles

332 articles · Page 5 of 17

Opinion: IoT Security Is Security Theatre Until We Make Default Passwords Illegal

Opinion: IoT Security Is Security Theatre Until We Make Default Passwords Illegal

Right, I'm done being diplomatic about this. After 40 years watching the same preventable disasters repeat themselves with different technology, I'm calling it: selling network-connected devices with default administrative credentials should be illegal in the UK. Not "discouraged." Not "recommended against." Illegal. With criminal penalties for manufacturers and civil liability for distributors. Pull up a chair. This intervention has been brewing for three decades. The free market has had 30 yea

Read more →
The 5-Step IoT Device Audit: Find and Secure Every Forgotten Computer on Your Network (Copy)

IOT Security

The 5-Step IoT Device Audit: Find and Secure Every Forgotten Computer on Your Network (Copy)

A 30-person marketing agency in Manchester did everything right. £15,000 invested in proper security: new firewalls, enterprise endpoint protection, hardware authentication keys for every staff member, and even an external security audit that came back clean. They were feeling quite good about themselves. Two months later? Someone had been accessing their client files for weeks through their HP printer that still used admin/admin as credentials. Total costs: £43,400 direct expenses, three lost c

Read more →
When the Password Manager Fails at Passwords: The £1.2 Million LastPass Lesson

When the Password Manager Fails at Passwords: The £1.2 Million LastPass Lesson

The ICO just fined LastPass £1,228,283 for security failures. Yes, a password manager company, fined for password security failures. The irony would be funny if 1.6 million UK customers hadn't had their data compromised. LastPass allowed senior employees to access corporate vaults from personal devices and let them link business and personal accounts with one master password. When an attacker exploited vulnerable Plex software on an engineer's home computer, they grabbed the keys to everything.

Read more →
The 5-Step IoT Device Audit: Find and Secure Every Forgotten Computer on Your Network

Practical Advice

The 5-Step IoT Device Audit: Find and Secure Every Forgotten Computer on Your Network

Practical Value: After Monday's podcast about the marketing agency breach through an unsecured printer, the most common question we've received is: \"How do I actually do this audit myself?\" Fair question. Telling business owners they have a problem is easy. Providing practical steps to fix it is harder. This guide walks you through conducting a comprehensive IoT device audit using free tools. Time investment: 4-6 hours for initial audit. Cost: Free to £200 for network scanning tools. Difficulty:

Read more →
Why Smart People Keep Ignoring Smart Device Security: The Psychology Behind IoT Blindness

Technology Risk

Why Smart People Keep Ignoring Smart Device Security: The Psychology Behind IoT Blindness

After this week's podcast revelation about the marketing agency losing client files through an unsecured printer, my inbox has been full of variations on the same question: how do intelligent business owners with otherwise solid security miss something this obvious? The answer isn't comfortable, but it's important: IoT security failures aren't about lack of intelligence. They're about systematic psychological blind spots that affect everyone from small business owners to government departments.

Read more →
Three Zero Days And A Christmas Timebomb: December Patch Tuesday Will Hurt If You Ignore It

Patch Tuesday

Three Zero Days And A Christmas Timebomb: December Patch Tuesday Will Hurt If You Ignore It

December 2025 Patch Tuesday is supposed to be the quiet cruise into Christmas, right? Instead we got fifty seven vulnerabilities, three zero days and one actively exploited Windows privilege escalation that hits almost every supported build. Add in one hundred and thirty nine Adobe fixes and an awkward five week gap until the next Patch Tuesday in January and you have a perfect festive storm. Are you really happy to leave servers and laptops unpatched while everyone is on holiday, or do you want

Read more →
Your £15,000 Security Investment Just Got Defeated by a £300 Printer

Technology Risks

Your £15,000 Security Investment Just Got Defeated by a £300 Printer

Right, let's talk about the £15,000 security investment that just got absolutely destroyed by a £300 office printer. A marketing agency did everything right: new firewalls, endpoint protection, hardware authentication keys for every staff member, security audit came back clean. Two months later? Someone had been accessing their client files for weeks through their HP printer still using admin/admin as credentials. While you've been securing laptops and servers, your printer has full network acce

Read more →
The Devices You Forgot Were Computers - IoT Security for Small Business

Podcast

The Devices You Forgot Were Computers - IoT Security for Small Business

What if I told you the biggest cyber threat to your business isn't hackers, but your office printer? Sounds mad, right? That's what a 30-person marketing agency thought before someone accessed their client files for weeks through an HP printer with factory default credentials. Episode 30 reveals the devices everyone forgets are computers: printers storing documents, CCTV systems livestreaming your premises, thermostats providing network access. Currently Top 12 in Apple Podcasts Management categ

Read more →
The Complete SMB Toolkit for Reverse Benchmarking: Free and Budget Tools That Actually Work

Practical Guides

The Complete SMB Toolkit for Reverse Benchmarking: Free and Budget Tools That Actually Work

Right, enough theory. Today we're getting practical: the actual tools, templates, and processes you need to implement reverse benchmarking without spending a fortune. Everything in this guide is either free or costs less than a decent takeaway curry per month. Because I'm sick of "enterprise security" guides that assume unlimited budgets and dedicated staff. This is the real-world, shoestring-budget, one-person-wearing-multiple-hats implementation guide. Asset inventory using Google Sheets: free

Read more →
The Psychology of Security Failures: Why Smart People Keep Making the Same Stupid Mistakes

Opinion & Analysis

The Psychology of Security Failures: Why Smart People Keep Making the Same Stupid Mistakes

Noel spent Monday and Tuesday explaining what reverse benchmarking is and how to implement it technically. Both excellent. Both necessary. Both completely inadequate if you don't understand why organizations systematically fail to learn from disasters. Here's the uncomfortable truth: most breaches happen not because organisations don't know what to do, but because human psychology actively prevents them from doing it. Normalcy bias makes us believe disasters happen to others. Optimism bias creat

Read more →
When Security Royalty Gets It Dangerously Wrong: Debunking the "Stop Hacklore" Letter

When Security Royalty Gets It Dangerously Wrong: Debunking the "Stop Hacklore" Letter

86 security professionals including former CISA director published advice last year claiming public WiFi, QR codes, and USB charging stations are safe. Sounds credible, except I've spent the year mopping up after businesses who followed exactly this advice. £47,000 stolen via hotel WiFi. Companies breached via QR code phishing. Legal practice ransomwared through compromised charging station. When security elite operate in enterprise bubbles with unlimited budgets, their advice becomes dangerous

Read more →
Reverse Benchmarking: Why Studying Cyber Failures Beats Copying Best Practices

Podcast

Reverse Benchmarking: Why Studying Cyber Failures Beats Copying Best Practices

Most people copy what the big players do and call it a cyber strategy. That works for them. It probably kills you. This episode flips the script. Instead of worshipping best practice, we dissect the car crashes. Target, Equifax, Colonial Pipeline and SolarWinds. We ask one question. What actually went wrong and have you quietly made the same mistakes in your own business. If you run a UK small or mid sized firm and feel lost in security buzzwords, this is your shortcut. Learn from other peoples

Read more →
The Comfortable Lie: Why UK Cybersecurity's Status Quo Is No Longer Defensible

The Comfortable Lie: Why UK Cybersecurity's Status Quo Is No Longer Defensible

Let's drop the diplomatic language for a moment. Current UK cybersecurity regulation is a comfortable lie we tell ourselves to avoid uncomfortable truths. We pretend fines deter when they don't. We pretend guidance works when it doesn't. We pretend breaches are inevitable when most are preventable. Meanwhile, millions of citizens have their data compromised by organisations that face no meaningful consequences. The Synnovis attack contributed to patient deaths. The ICO's response? Under investig

Read more →
When Enforcement Gets Teeth: UK Case Studies in Accountability That Works

When Enforcement Gets Teeth: UK Case Studies in Accountability That Works

Numbers don't lie. In 1981, 495 workers died in British workplaces. The most recent figures show 124. That's not technological progress alone. That's regulatory teeth. When the Health and Safety Executive gained proper enforcement powers, directors discovered that ignoring safety had personal consequences. Prosecutions made headlines. Behaviour changed. Industries transformed. Today, we examine exactly how HSE enforcement worked and exactly what similar cybersecurity enforcement could achieve. T

Read more →
Demonstrating Reasonable Care: Your Practical Guide to Cybersecurity Accountability

Small Business Security

Demonstrating Reasonable Care: Your Practical Guide to Cybersecurity Accountability

Enough theory. Today we're getting practical. Whether or not director liability becomes law, demonstrating reasonable care protects your business now. Insurance claims require evidence. Contracts demand due diligence. Regulators ask what you did before the breach. This guide gives you exactly what you need: the five controls that matter, documentation templates, evidence gathering processes, and realistic timelines for businesses of every size. No enterprise consultants required. No massive budg

Read more →
Why Personal Accountability Changes Everything: The Psychology of Director Liability

Risk Management

Why Personal Accountability Changes Everything: The Psychology of Director Liability

After two days discussing frameworks and technical standards, let's examine why personal accountability actually works when corporate fines consistently fail. The psychology is fascinating and explains decades of regulatory success and failure. When British Airways faced a £20 million fine, nobody lost their job. When HSE prosecutes directors, workplace safety transforms overnight. The difference isn't the amount of money. It's whose money gets spent and whose freedom gets threatened. Human psyc

Read more →
The Three-Tier Cybersecurity Liability Framework: What It Means for Your Business

Risk Management

The Three-Tier Cybersecurity Liability Framework: What It Means for Your Business

Yesterday's podcast proposed criminal liability for cybersecurity negligence. Today, we're dismantling the three-tier framework piece by piece so you know exactly where your business stands. Tier One protects small businesses with explicit gross negligence thresholds and Cyber Essentials safe harbour. Tier Two raises the bar for medium organisations whilst maintaining proportionate standards. Tier Three brings genuine consequences for large enterprises and public sector bodies that still can't i

Read more →
Prison Time for Directors? Part 2: Building the UK Cybersecurity Accountability Framework

Podcast

Prison Time for Directors? Part 2: Building the UK Cybersecurity Accountability Framework

Yes, you read that correctly. Prison time for directors who allow catastrophic cybersecurity failures. Before you close this tab in horror, hear me out. We already send directors to prison for health and safety failures. Workplace fatalities dropped 85% after the Health and Safety Executive got proper enforcement powers. The ICO? They send sternly worded letters whilst breaches affecting millions go unpunished. Today, Mauven and I lay out exactly what a proper UK cybersecurity enforcement regime

Read more →
Designing the Corporate Cyber Negligence Act (What Accountability Looks Like)

Podcast

Designing the Corporate Cyber Negligence Act (What Accountability Looks Like)

This week, we established why directors should face criminal prosecution for gross cybersecurity negligence. We examined the Synnovis case where a patient died because free MFA was not enabled. We provided technical analysis, psychological examination, and practical implementation guides. Saturday's opinion piece argued forcefully for criminal liability. Next week, we move from "why" to "how." What would a Corporate Cyber Negligence Act actually say? What are the thresholds between bad luck and

Read more →
Enough. It Is Time to Send Negligent Directors to Prison for Cyber Failures.

Opinion & Analysis

Enough. It Is Time to Send Negligent Directors to Prison for Cyber Failures.

I am tired of watching preventable disasters kill people while executives walk away with bonuses intact. A patient died because Synnovis did not enable free multi-factor authentication. Nobody will face criminal prosecution. If a construction director failed to provide hard hats and a worker died, that director would go to prison. Yet when healthcare executives fail to enable free security controls and a patient dies, nothing happens. This is not justice. This is not accountability. This is a br

Read more →