🗳️ Vote for us on PodRadar Security Theatre Exposed — Passkeys, the CISA Leak & Your Cyber Insurance Vote now →

All Articles

332 articles · Page 6 of 17

The Synnovis Ransomware Disaster: Complete Timeline and Technical Analysis

Case Studies

The Synnovis Ransomware Disaster: Complete Timeline and Technical Analysis

On 3 June 2024, the Qilin ransomware gang compromised Synnovis, a pathology provider serving NHS hospitals across southeast London. Blood testing collapsed. Over 10,000 appointments were cancelled. More than 1,700 operations were postponed. A patient died waiting for test results that never arrived. The attack succeeded because multi-factor authentication was not enabled. Here is the complete timeline of how a preventable security failure cascaded into catastrophic harm, the technical details of

Read more →
How to Implement MFA Across Your Business in One Afternoon (Complete Guide)

How-To Guide

How to Implement MFA Across Your Business in One Afternoon (Complete Guide)

After this week's coverage of the Synnovis death, many of you have asked: "How do I actually implement MFA in my business?" Here is your complete, practical guide. No jargon, no theory, just step-by-step instructions for enabling multi-factor authentication across your entire organisation. This afternoon. Right now. Whether you are running Microsoft 365, Google Workspace, or a mix of different services, this guide walks you through the exact process. I will show you how to configure systems, dep

Read more →
The Psychology of Cybersecurity Negligence: Why Smart People Make Fatal Decisions

Industry Analysis

The Psychology of Cybersecurity Negligence: Why Smart People Make Fatal Decisions

Nobody wakes up and decides to let patients die through cybersecurity negligence. Yet that is precisely what happened at Synnovis. The executives who failed to enable multi-factor authentication were not cartoon villains. They were educated professionals running a critical healthcare organisation. So why did they make a decision that, in hindsight, seems obviously catastrophic? The answer lies in the psychological mechanisms that allow intelligent people to rationalise terrible choices, the orga

Read more →
Why Multi-Factor Authentication Could Have Prevented the Synnovis Death

Technical Analysis

Why Multi-Factor Authentication Could Have Prevented the Synnovis Death

When Beverley Bryant, former Chief Digital Information Officer at Guy's and St Thomas' NHS Foundation Trust, stated that the Synnovis attack "may not have happened" with two-factor authentication enabled, she was not speculating. She was describing technical reality. The Qilin ransomware gang gained initial access through compromised credentials. Multi-factor authentication completely blocks this attack vector. A patient died because a free security control was not enabled. This is not hindsight

Read more →
Should Directors Face Prison Time for Cybersecurity Negligence?

Podcast

Should Directors Face Prison Time for Cybersecurity Negligence?

On 3 June 2024, a patient arrived at a London hospital A&E feeling unwell. A blood test was ordered. The patient waited. The medics waited. They all waited some more. The patient died. Why? Ransomware had shut down blood testing at Synnovis, the NHS pathology provider. The security control that would have stopped it? Multi-factor authentication. Completely free. Built into every platform. The consequences for executives who chose not to enable it? Nothing. In this episode, we ask the uncomfo

Read more →
When Your Biggest Customer Gets Hacked: The £1.9 Billion Lesson No One’s Talking About

Industry Analysis

When Your Biggest Customer Gets Hacked: The £1.9 Billion Lesson No One’s Talking About

Financial Accountant magazine just published my analysis of the £1.9 billion Jaguar Land Rover cyberattack. But here’s what the article couldn’t cover: the small suppliers who died from JLR’s breach. You didn’t get hacked. Your biggest customer did. You still lost everything. One supplier laid off 40 people because JLR couldn’t place orders for six weeks. Proper security. Good practices. Still went bust. After 40 years in the IT world Intel, Disney, and the BBC, I’ve seen this pattern before. En

Read more →
November 2025 Patch Tuesday: A Perfect Storm of Critical Vulnerabilities Demands Immediate Action

Patch Tuesday

November 2025 Patch Tuesday: A Perfect Storm of Critical Vulnerabilities Demands Immediate Action

Four zero-days. One perfect 10.0 severity score. Hundreds of thousands of sites already compromised. Criminals are exploiting Exchange Servers, Magento shops, and Oracle ERP systems right now - whilst you're reading this. SAP's vulnerability was so bad they deleted the entire component rather than fix it. WordPress sites are falling to a plugin bug that shouldn't exist. And that's just November. Your patching strategy just became a lot more urgent. Graham Falkner breaks down what to patch first:

Read more →
Ofcom's Secret VPN Surveillance: When Britain Embraced the Authoritarian Playbook

Podcast

Ofcom's Secret VPN Surveillance: When Britain Embraced the Authoritarian Playbook

Ofcom admits it is monitoring VPN use across Britain with a secret AI tool and unnamed data sources. That should worry any small business that relies on encrypted links for daily work. The tool cannot tell a secure office connection from someone dodging age checks. Section 121 still sits in law, ready to force scanning of encrypted chats. Does that sound like a free internet to you? Document your use. Keep your controls tight. Ask your MP why this is acceptable. Do you want regulators watching y

Read more →
Opinion: UK SMBs Are Funding AI's Energy Crisis and Nobody Asked Permission

Technology Risk

Opinion: UK SMBs Are Funding AI's Energy Crisis and Nobody Asked Permission

Here's a question for your weekend: Did anyone ask if UK small businesses wanted to fund Microsoft's nuclear reactor restart? Because that's what's happening. While Microsoft spends $1.6 billion restarting Three Mile Island, Google partners with Kairos Power for small modular reactors, and Amazon secures nuclear capacity across multiple projects, your cloud bills are climbing to pay for it. Nobody took a vote. Nobody asked permission. Tech giants made a collective decision that AI is worth unlim

Read more →
The Nottingham Agency That Spent £47,000 on Cloud Bills They Didn't Need

Industry Analysis

The Nottingham Agency That Spent £47,000 on Cloud Bills They Didn't Need

Twenty-three employees. Eighteen months. Forty-seven thousand pounds wasted on cloud infrastructure they didn't need, SaaS subscriptions nobody used, and auto-scaling rules designed by a consultant who'd never checked back. This isn't a horror story about a massive enterprise with unlimited budget. This is CloudBridge Digital, a Nottingham digital agency that discovered they'd been hemorrhaging cash while Microsoft, AWS, and a parade of SaaS vendors quietly helped themselves to the company bank

Read more →
7 Actions to Stop Your Cloud Bill Funding AI's Nuclear Ambitions

Business Security

7 Actions to Stop Your Cloud Bill Funding AI's Nuclear Ambitions

Microsoft's restarting Three Mile Island. Google's building small modular reactors. Amazon's buying nuclear capacity. And you're getting the bill. While tech giants scramble for gigawatts to power their AI fantasies, your cloud costs are climbing faster than a hyperactive squirrel on espresso. AWS up 15%, Azure up 12%, SaaS tools adding "AI features" you didn't ask for at 20% premium. But here's what nobody's telling you: you don't need to accept this as inevitable. Seven specific actions you ca

Read more →
When the Panic Becomes Obvious

Threat Intelligence

When the Panic Becomes Obvious

Three Mile Island. You remember it, right? The 1979 nuclear accident that terrified an entire generation and effectively killed nuclear power plant construction in America for 40 years? Microsoft just spent $1.6 billion to restart Unit 1. Not for clean energy virtue signaling. Because they're bloody desperate. Google committed to 500 megawatts of Small Modular Reactors. Amazon's all-in on multiple nuclear projects. Meta wants up to 4 gigawatts. Billions in nuclear investment. Timeline: 2028 to 2

Read more →
When Two Swiss Scientists Decided Silicon Wasn't Good Enough

Technology Risks

When Two Swiss Scientists Decided Silicon Wasn't Good Enough

They're growing brain tissue in Swiss laboratories and using it to process information. Not simulations. Actual living human neurons, derived from skin cells, housed in specialized chambers, connected to electrodes, computing. FinalSpark's Neuroplatform has 16 brain organoids containing roughly 160,000 neurons total. Each organoid interfaces with 8 electrodes sampling at 30 kHz. The system has operated continuously for four years, testing over 1,000 organoids, collecting 18 terabytes of data. Th

Read more →
No MFA? No Certification. The Cyber Essentials Rule That Changes Everything

Cyber Essentials 2026

No MFA? No Certification. The Cyber Essentials Rule That Changes Everything

The April 2026 Cyber Essentials update introduces a game-changing rule: multi-factor authentication is now mandatory. Not recommended. Not "nice to have." Mandatory. If your cloud service offers MFA (free or paid) and you're not using it, you automatically fail. No exceptions. This single change will expose how many UK businesses have been skating by with terrible security. With potentially 30,000+ certified companies lacking proper MFA configuration, the fallout will be significant. You've got

Read more →
The Frankenstein Computer That's Actually Real

Threat Intelligence

The Frankenstein Computer That's Actually Real

There's a lab in Switzerland where they're building computers out of living human neurons. Sounds completely barking mad, right? Here's the thing: these brain cells compute using one million times less energy than silicon. Meanwhile, training a single AI model now produces the carbon emissions of 500 cars over their entire lifetimes. Microsoft, Google, and Amazon just committed billions to restart nuclear power plants because they can't keep the lights on. And your business? You're paying for ev

Read more →
Weekend Reflection - Efficiency Theatre and the Tyranny of the Measurable

PodCast

Weekend Reflection - Efficiency Theatre and the Tyranny of the Measurable

Why do smart people keep making the same catastrophic mistake? Cut security spending, congratulate themselves on efficiency, watch everything fall apart, spend vastly more recovering. It's not ignorance. It's psychology. Measurable costs are visible, politically defensible, easy to justify cutting. Invisible value is theoretical until it disappears. CFOs get promoted for cutting £50,000 from budgets. Nobody gets promoted for preventing breaches that don't happen. This asymmetry creates systemati

Read more →
UK Case Study - The Manchester Marketing Agency That Cut Training and Lost Everything

PodCast

UK Case Study - The Manchester Marketing Agency That Cut Training and Lost Everything

Manchester marketing agency, 28 staff, £2.4M revenue. CFO proposed cutting security training: "£12,000 annually for slides nobody watches." Board agreed. Six months later, junior account manager clicked phishing link in fake client brief. No training meant she didn't recognise warning signs. Credentials stolen, ransomware deployed, three weeks offline. Recovery costs: £190,000. ICO investigation: inadequate training documented. They saved £12,000 and spent £190,000 learning what training actuall

Read more →
Practical Guide - Evaluating Security Cost Cuts Without Destroying Your Business (Copy)

PodCast

Practical Guide - Evaluating Security Cost Cuts Without Destroying Your Business (Copy)

Stop cutting security costs based on gut feel and budget pressure. Start using actual frameworks that calculate downside risk. This practical guide walks you through evaluating any security spending decision: What's the notional function versus actual value? What's the cost of being wrong? What's the expected cost multiplied by probability? What invisible value disappears when you cut this? Includes checklists, decision trees, and real cost calculations for training, MFA, insurance, IT staff, an

Read more →
The British Library's £7 Million MFA Decision

Threat Intelligence

The British Library's £7 Million MFA Decision

The British Library decided not to implement MFA on administrator accounts. Their reasoning: "practicality, cost and impact on ongoing programmes." That decision cost them £7 million in recovery, 600GB of staff data dumped on the dark web, and over a year of service disruption. This is Mauven's Take on one of the clearest examples of the doorman fallacy in UK history. When cost-cutting decisions focus narrowly on immediate expense whilst ignoring catastrophic downside risk, you get exactly this

Read more →
The Doorman Fallacy - Complete Framework for UK Businesses

PodCast

The Doorman Fallacy - Complete Framework for UK Businesses

I've watched businesses make the same catastrophic mistake for 40 years. They look at security costs through a narrow efficiency lens, define roles by their obvious function, cut them to save money, and completely miss the invisible value. Until it's gone. Then they spend 10 times more fixing what they broke. The doorman fallacy explains every stupid IT decision I've ever seen: training cuts that cost millions in breaches, MFA removal that gifts credentials to attackers, insurance cancellation t

Read more →