The Small Business

Cyber Security Guy

Welcome to my personal blog — a space where I share my own views, opinions, and insights on technology, cyber security, and the realities of working in IT.

This blog is entirely personal. The thoughts and opinions expressed here are mine alone. They do not represent the views, policies, or positions of my employer, past or present, or any organisation I’m associated with professionally or personally.

Expect a mix of:

  • Straight-talking advice for small businesses

  • Honest takes on cyber security and IT trends

  • The occasional rant

  • A few war stories from the frontlines (names removed to protect the guilty)

With over 40 years in the industry, I’ve seen a lot — some of it brilliant, some of it baffling.

This blog is where I unpack all of it.

Man wearing glasses and a light gray sweater, smiling
Snap, Crackle, Compromise: How Kellogg's Quietly Served Up Employee Data to Hackers
Breach Reports News Desk Breach Reports News Desk

Snap, Crackle, Compromise: How Kellogg's Quietly Served Up Employee Data to Hackers

Think your breakfast is safe? Think again. WK Kellogg Co.—yes, the cereal giant—just had employee data spilled thanks to a third-party software breach. Hackers from the Clop ransomware gang waltzed in via Cleo’s "secure" file transfer platform and helped themselves to names, addresses, and Social Security numbers.

It’s another textbook example of supply chain negligence dressed up as digital transformation.

If your business relies on vendors without grilling their security, you might as well start pouring milk on your firewall and calling it breakfast. Here's how it happened—and why it should scare the cereal out of you.

Read More
Breach of the Month Club: March 2025 Edition
Breach Reports Noel Bradford Breach Reports Noel Bradford

Breach of the Month Club: March 2025 Edition

Welcome to the inaugural edition of Breach of the Month Club™, your monthly tour of reputational disaster.

March 2025 was a banner month for avoidable breaches, from Lloyds accidentally mailing out million-pound statements, to Jaguar Land Rover getting wrecked by leaked JIRA credentials.

Reform UK ignored GDPR completely, Morrisons got battered by a supplier breach, and 23andMe? Well, they lost your DNA and filed for bankruptcy.

We break it all down with just the right amount of sarcasm—and a reminder that no company is too big to fail at basic cyber hygiene.

Read More
Unprecedented Surge: Nearly 24,000 IPs Target PAN-OS GlobalProtect Gateways in Coordinated Attack​
News Desk News Desk

Unprecedented Surge: Nearly 24,000 IPs Target PAN-OS GlobalProtect Gateways in Coordinated Attack​

Nearly 24,000 IP addresses just launched a coordinated scan on Palo Alto Networks’ GlobalProtect gateways — and if you think this was random, think again. This wasn’t a glitch in the matrix or some bored script kiddie.

It was targeted, global, and likely the opening move in something far bigger. If you’re running PAN-OS at the edge of your network and haven’t patched recently, you’re on the menu.

This article breaks down what happened, what it means, and what you need to do right now before your firewall turns into a front door. Spoiler: hope is not a security strategy.

Read More
Apple’s 3 Zero-Days: If You Haven’t Updated Yet, What Are You Even Doing With Your Life?
Noel Bradford Noel Bradford

Apple’s 3 Zero-Days: If You Haven’t Updated Yet, What Are You Even Doing With Your Life?

Apple has dropped emergency updates to fix three zero-day vulnerabilities—and yes, they’re already being exploited.

These flaws affect iPhones, iPads, Macs, and more, letting attackers bypass USB protections, escape Safari’s sandbox, and escalate privileges through CoreMedia.

If you’re not updating your devices right now, you’re basically rolling out the red carpet for hackers. This isn’t just another patch Tuesday. It’s a loud, flashing red warning. Your move.

Read More
"We’ve Been Breached!" – What UK SMBs Must Do in the First 24 Hours (and Why Most Get It Wrong)
Noel Bradford Noel Bradford

"We’ve Been Breached!" – What UK SMBs Must Do in the First 24 Hours (and Why Most Get It Wrong)

A cyber breach isn’t just an IT headache—it’s a full-blown business crisis. If you run a small UK business and your systems are compromised, your next 24 hours are critical.

This guide walks you through what to do and why—from shutting the breach down without wiping forensic evidence, to dealing with regulators, staff, and customers. Most importantly, it makes clear that your MSP or IT team should not be leading the response.

You need an independent Incident Manager and a solid plan. No fluff. No jargon. Just the straight facts to help you limit damage and recover fast.

Read More
How Long Has a Hacker Been Living Rent-Free in Your Business? IBM's Dwell Time Report Explained for UK SMBs
Noel Bradford Noel Bradford

How Long Has a Hacker Been Living Rent-Free in Your Business? IBM's Dwell Time Report Explained for UK SMBs

A hacker could be hiding in your business for over nine months before you even notice—and IBM has the stats to prove it. Their latest report shows UK small businesses are dangerously exposed to long dwell times, where cybercriminals quietly steal data, cause chaos, and vanish before anyone sounds the alarm. If you're not actively looking for threats, you're practically inviting them in. Here's what dwell time means for your business—and how to slam the door shut.

Read More
NHS Software Supplier Ransomwared – Gets a £3M Discount for Being Helpful?
Noel Bradford Noel Bradford

NHS Software Supplier Ransomwared – Gets a £3M Discount for Being Helpful?

So naturally… the ICO fined them £4.4 million.
And then knocked £3 million off for being helpful afterwards.

Yes, really. That’s the cybersecurity equivalent of “you crashed the car but said sorry nicely—so we’ll waive the repair bill.”

I’ve written a new piece on this absolute masterclass in weak governance, supplier accountability theatre, and the dangerous precedent it sets.

Read More
UK Businesses Under Siege: Over Half Hit by Cyberattacks in 2024—Are You Next?
Noel Bradford Noel Bradford

UK Businesses Under Siege: Over Half Hit by Cyberattacks in 2024—Are You Next?

Over half of UK businesses got digitally f**ked last year—and most didn’t even realise until it was too late. While leadership played buzzword bingo, ransomware crews strolled in through weak passwords and forgotten patches. Attacks hit every 44 seconds. Still think “we’re too small to be a target” holds up? It doesn’t. Hope isn’t a strategy. Luck isn’t resilience. And if you’ve got no plan, you’re just waiting to be the next headline.

Read More
Microsoft Breaks Remote Desktop (Again): What SMBs and IT Pros Need to Know
Noel Bradford Noel Bradford

Microsoft Breaks Remote Desktop (Again): What SMBs and IT Pros Need to Know

Microsoft’s at it again—this time breaking Remote Desktop for Windows 11 users with their latest round of updates. If your helpdesk tickets are piling up with RDP disconnects and login weirdness, you’re not alone.

From silent session drops to broken smart card authentication, this bug is hitting SMBs and IT pros where it hurts. We unpack what’s going wrong, who’s affected, and how to survive it—while Microsoft casually promises a fix “at some point.” Spoiler: rollback might be your only friend.

Read More
Why London's 5G is the Worst in Europe (But It Doesn’t Have to Be)
Noel Bradford Noel Bradford

Why London's 5G is the Worst in Europe (But It Doesn’t Have to Be)

London ranks dead last for 5G performance in Europe – but it’s not just the capital struggling. Across the UK, coverage is patchy, motorway connectivity is unreliable, and performance wildly varies between networks.

Yet where it’s deployed properly, UK 5G can rival the best on the continent.

The problem? Not the tech – the execution. Less hype, more follow-through, and a proper plan could turn the UK’s 5G fortunes around.

Read More
Your Office Spends More on Coffee Than Cybersecurity Training—and That’s How You Get Hacked
Noel Bradford Noel Bradford

Your Office Spends More on Coffee Than Cybersecurity Training—and That’s How You Get Hacked

Most UK businesses spend more on coffee than on Cyber Security Awareness Training—and that’s exactly how breaches happen. Your biggest threat isn’t a hacker in a hoodie; it’s Dave in Sales clicking a dodgy email.

The good news? Quality training is cheap, effective, and actually enjoyable. For less than the cost of your weekly latte run, you can turn your staff from cyber risks into cyber defenders.

Still think you can’t afford it? Think again.

Read More
Fake CAPTCHAs Are Now Malware Traps – Because Of Course They Are!

Fake CAPTCHAs Are Now Malware Traps – Because Of Course They Are!

Think you’re safe clicking through a CAPTCHA? Think again. Cybercriminals are hijacking your trust with fake CAPTCHA pop-ups that trick you into downloading malware—by following simple keyboard instructions you’d never question. One click and boom—your passwords, wallets, and entire digital life are up for grabs. This isn’t just clever, it’s terrifyingly effective. If you’ve ever hit "I’m not a robot," you need to read this before you hand your system over to hackers.

Read More
Your Bluetooth Devices Might Be Spying on You – And It’s Not Even Your Fault
Noel Bradford Noel Bradford

Your Bluetooth Devices Might Be Spying on You – And It’s Not Even Your Fault

Think your Bluetooth devices are safe? Think again. Security researchers just found hidden, undocumented commands in the ESP32 chip—used in over a billion devices worldwide. This means hackers could exploit your smart gadgets, from speakers to security cameras, without you ever knowing. And the best part?

Manufacturers didn’t tell anyone. Is your tech spying on you? Maybe. Here’s what you need to know—and how to protect yourself before it’s too late. 🚨

Read More
DrayTek Disaster: Why Your Business Wi-Fi Just Became a Cybersecurity Liability

DrayTek Disaster: Why Your Business Wi-Fi Just Became a Cybersecurity Liability

A critical flaw in DrayTek routers is wreaking havoc on UK broadband connections — and no, this isn’t just a “techie problem.” Businesses across the country are unknowingly running vulnerable, outdated routers that are now being blocked by ISPs for good reason.

DNS hijacks, remote code execution, and silent compromises are all in play. If you're still clinging to your 2018 networking gear like it’s a family heirloom, it’s time to wake up. This isn’t about cost — it’s about negligence. Here’s what’s going on, why it matters, and what to do before your internet (and reputation) vanishes.

Read More
2-Step Verification: The Absolute Bare Minimum for People Who Actually Give a Damn
Cyber Security for Small Businesses, MFA Noel Bradford Cyber Security for Small Businesses, MFA Noel Bradford

2-Step Verification: The Absolute Bare Minimum for People Who Actually Give a Damn

If you're still not using 2-Step Verification (2SV), you might as well leave your front door wide open, bake some cookies for the burglars, and leave a note that says, "Take what you like, I clearly don’t give a shit." Sounds ridiculous? So does ignoring the absolute bare minimum of online security. Passwords alone are about as effective as a chocolate teapot, and cybercriminals love people who think 2SV is “too much hassle.” If typing in a short code now and then feels like a chore, maybe the internet isn’t for you. Get 2SV enabled before you end up Googling, "What to do when my bank account is emptied?"

Read More
Lazarus Strikes Again: North Korean Hackers Crash the NPM Party
Cyber Security for Small Businesses, News, Alerts Noel Bradford Cyber Security for Small Businesses, News, Alerts Noel Bradford

Lazarus Strikes Again: North Korean Hackers Crash the NPM Party

North Korea's Lazarus hackers are back, gleefully slipping malicious code into popular NPM packages—think razor blades hidden in your Halloween sweets. Hundreds of developers unwittingly invited cybercriminals into their digital lives, losing sensitive data and perhaps some self-respect. This latest supply-chain fiasco underscores a crucial lesson: trust no package blindly.

Treat your code dependencies like milk—check regularly, or risk finding something unpleasantly chunky in your morning coffee. Vigilance isn't optional; it's essential.

Read More
Choosing an MSP: Swipe Left on These IT Horror Stories
The Secrets of MSPS Noel Bradford The Secrets of MSPS Noel Bradford

Choosing an MSP: Swipe Left on These IT Horror Stories

Thinking of hiring an MSP? Don’t swipe right just yet! 🚩 From laughably cheap pricing to alarming shared tenants and MSPs holding your admin access hostage, we're exposing the worst IT provider red flags.

Learn how to dodge the charm, avoid costly mistakes, and choose a provider who won't leave your business exposed. Your business deserves better—don't settle for IT nightmares!

Read More

⚠️ Full Disclaimer

This is my personal blog. The views, opinions, and content shared here are mine and mine alone. They do not reflect or represent the views, beliefs, or policies of:

  • My employer

  • Any current or past clients, suppliers, or partners

  • Any other organisation I’m affiliated with in any capacity

Nothing here should be taken as formal advice — legal, technical, financial, or otherwise. If you’re making decisions for your business, always seek professional advice tailored to your situation.

Where I mention products, services, or companies, that’s based purely on my own experience and opinions — I’m not being paid to promote anything. If that ever changes, I’ll make it clear.

In short: This is my personal space to share my personal views. No one else is responsible for what’s written here — so if you have a problem with something, take it up with me, not my employer.