The Small Business

Cyber Security Guy

Welcome to my personal blog — a space where I share my own views, opinions, and insights on technology, cyber security, and the realities of working in IT.

This blog is entirely personal. The thoughts and opinions expressed here are mine alone. They do not represent the views, policies, or positions of my employer, past or present, or any organisation I’m associated with professionally or personally.

Expect a mix of:

  • Straight-talking advice for small businesses

  • Honest takes on cyber security and IT trends

  • The occasional rant

  • A few war stories from the frontlines (names removed to protect the guilty)

With over 40 years in the industry, I’ve seen a lot — some of it brilliant, some of it baffling.

This blog is where I unpack all of it.

Man wearing glasses and a light gray sweater, smiling
CVE and CVSS: The Rotten Heart of Cybersecurity We Almost Let Die (and Maybe Should Have)
Noel Bradford Noel Bradford

CVE and CVSS: The Rotten Heart of Cybersecurity We Almost Let Die (and Maybe Should Have)

In April 2025, the global cybersecurity world almost lost CVE — the bedrock of vulnerability tracking — not to hackers, but to sheer bureaucratic incompetence. While politicians played games and cyber defenders were told to look the other way, the fragile, outdated systems of CVE and CVSS staggered toward collapse.

We didn’t fix them. We barely taped them back together. This isn’t just a story of near-miss disaster — it’s a full-blown indictment of cybersecurity's rotting foundations. If we do not burn it all down and rebuild, the next collapse won’t be a warning. It will be the end.

Read More
Cybersecurity Is Not Optional: How a £60K Fine Just Woke Up Small Law Firms
Cyber Security for Small Businesses Noel Bradford Cyber Security for Small Businesses Noel Bradford

Cybersecurity Is Not Optional: How a £60K Fine Just Woke Up Small Law Firms

Think your law firm is too small for hackers to bother with? DPP Law thought so too—right up until they faced a £60,000 fine and a public shaming after a catastrophic cyber attack. A single unsecured admin account was all it took to unleash chaos.

No MFA, no breach reporting, no chance. If you are still relying on luck instead of basic cyber hygiene, you are playing a dangerous game with your clients’ trust—and your firm’s future. Cyber Essentials is the starting line, not the victory lap. How much will you lose before you wake up?

Read More
Windows 11 Let Hackers Gain Admin in 300ms.
Noel Bradford Noel Bradford

Windows 11 Let Hackers Gain Admin in 300ms.

Think Windows 11 was secure? Think again. A critical flaw let attackers hijack full admin control in just 300 milliseconds using a tired old trick – DLL hijacking. Microsoft called it “Important” (because, sure, SYSTEM access is casual now), but for the rest of us, it was a neon sign saying “Hack me.”

Find out how your phone link feature became a hacker’s dream, why millions were left exposed for six months, and why patching yesterday might still not save you. How many ticking time bombs are hiding in Windows 11? Are you ready for the next one?

Read More
Why Your Android Phone Will Now Reboot Itself Every 3 Days (And Why That’s a Good Thing)
Noel Bradford Noel Bradford

Why Your Android Phone Will Now Reboot Itself Every 3 Days (And Why That’s a Good Thing)

Google is stepping up Android security by introducing an automatic reboot feature. If your phone remains idle for three days after a critical update, it will now reboot itself to apply the patch and enhance your protection. This smart move helps close the vulnerability window users often leave open by ignoring reboot prompts.

Designed to be seamless and non-intrusive, the feature ensures devices are updated without disrupting daily use.

While not mandatory across all manufacturers yet, it signals a strong shift towards making mobile cybersecurity automatic, effortless, and unavoidable — exactly what modern users need in today’s fast-evolving threat landscape.

Read More
The 4chan Hack: When the Internet's Toilet Got Flooded – And What That Means for Your Business
Noel Bradford Noel Bradford

The 4chan Hack: When the Internet's Toilet Got Flooded – And What That Means for Your Business

In April 2025, 4chan – the internet’s digital back alley – got thoroughly rinsed. A full-scale hack exposed moderators, leaked source code, and proved even the web’s most chaotic platforms aren’t immune to catastrophic failure. But here’s the twist: the real story isn’t the leak, it’s what it reveals about your own business.

If outdated software, poor access control, or silence-in-a-crisis sounds familiar, you’re already on thin ice. This isn’t just drama for meme lords – it’s a neon-lit warning for UK SMBs. Find out what happened, who did it, and how not to be next.

Read More
Marks & Spencer Cyberattack: Why Your Click & Collect Order is Missing and Your Contactless Card is Crying
Breach Reports News Desk Breach Reports News Desk

Marks & Spencer Cyberattack: Why Your Click & Collect Order is Missing and Your Contactless Card is Crying

Percy Pig and Colin the Caterpillar Have Been Taken Hostage – And Yes, This Is Real Life
Marks & Spencer has confirmed it’s the latest victim of a cyberattack, but forget dull technical jargon — the internet’s gone wild over rumours that iconic treats Percy Pig and Colin the Caterpillar are caught in the digital crossfire.

With contactless payments down and click-and-collect orders delayed, shoppers have been left confused, furious, and Colin-less.

Was it ransomware? A supply chain hit? Or just a catastrophic IT whoopsie? We’ve dug into the timeline, the fallout, and the very British drama that is a cake and a pig caught in cyber limbo.

Read More
Samsung Galaxy S24 Security Disaster: How a Built-In App Left Millions at Risk
Noel Bradford Noel Bradford

Samsung Galaxy S24 Security Disaster: How a Built-In App Left Millions at Risk

The Samsung Galaxy S24 was meant to be the crown jewel of Android. Instead, it shipped with a gaping security hole—thanks to a preinstalled app no one asked for. Researchers found that this app allowed remote attackers to hijack your device, steal your data, and generally wreck your digital life. This isn’t just sloppy—it’s a disgrace.

Samsung pushed out a flagship phone with built-in vulnerabilities, proving once again that shiny hardware means nothing if the software is a ticking time bomb. If you own a Galaxy S24, you should be furious. If you don’t—maybe keep it that way.

Read More
Rent-a-Malware: Hackers Now Offering Full macOS Control for Hire
Noel Bradford Noel Bradford

Rent-a-Malware: Hackers Now Offering Full macOS Control for Hire

People used to think Macs couldn’t get viruses. That’s no longer true. New malware kits called JokRAT and XenoRAT can give hackers full control of a Mac computer. These tools are easy to rent online, even for people with no tech skills.

Hackers can use them to spy on you, steal files, and stay hidden on your computer. Mac users should use security software, update their systems often, and be careful about what they click on.

If your Mac is part of a company network, a single infected device can put the whole business at risk. Stay alert and stay protected.

Read More
Patch Me If You Can: Firewall Vendors Ranked by How Much They Care About Your Security
Cyber Security for Small Businesses Noel Bradford Cyber Security for Small Businesses Noel Bradford

Patch Me If You Can: Firewall Vendors Ranked by How Much They Care About Your Security

Not all firewalls are created equal—some vendors make patching painless, others seem to actively hide the fixes. We evaluated SonicWall, Fortinet, UniFi, DrayTek, Zyxel, WatchGuard, Sophos, Meraki and more using a realistic UK small business setup: one firewall, one switch, two access points.

Then we scored them out of 50 on cost, usability, licensing, and update handling.

Spoiler: UniFi smashed it. SonicWall? Not so much. If you want to know which vendor respects your time and budget—and which one just wants your wallet—this is your no-nonsense firewall buyer’s guide.

Read More
Over 4,000 WordPress Sites Hacked – All Thanks to Yet Another Plugin Flaw
News, Vulnerability Noel Bradford News, Vulnerability Noel Bradford

Over 4,000 WordPress Sites Hacked – All Thanks to Yet Another Plugin Flaw

More than 4,000 WordPress websites have been hacked thanks to a critical vulnerability in the WP-Automatic plugin.

The flaw (CVE-2024-27956) allows unauthenticated attackers to inject malicious code, redirect users, and install backdoors—all without logging in.

Despite a patch being available, thousands of sites remain vulnerable due to poor update practices and weak plugin hygiene.

This isn't just another WordPress scare story—it's a glaring example of why unmanaged, unmonitored websites are a security liability.

If you’re still treating your website like a digital brochure from 2010, it’s time to wake up before Google blocks you altogether.

Read More
Oracle’s Legacy Patching Fiasco: A Masterclass in How Not to Handle a Breach
Noel Bradford Noel Bradford

Oracle’s Legacy Patching Fiasco: A Masterclass in How Not to Handle a Breach

Oracle just got hacked—badly—and their excuse? “It was just a legacy system.” That’s corporate-speak for we left the door wide open for four years and hoped no one would notice. Millions of records stolen, a $20 million ransom, and Oracle’s response was to shrug and point at the old kit.

If you’re running ancient servers and thinking it won’t happen to us, think again. This isn’t just Oracle’s disaster—it’s a wake-up call for every UK business still clinging to outdated tech. Want to know how a four-year-old bug turned into a PR nightmare? You’ll want to read this.

Read More
They Slid Into Your DMs: How Hackers Are Weaponising Microsoft Teams to Breach Your Business
News Desk News Desk

They Slid Into Your DMs: How Hackers Are Weaponising Microsoft Teams to Breach Your Business

Hackers are now using Microsoft Teams chats to phish credentials and drop malware — right under your nose. By exploiting Teams' external access features and mimicking trusted domains, attackers send convincing messages that look like they’re from colleagues or suppliers.

Users, assuming Teams is safe, often click without thinking. These attacks bypass traditional email defences and thrive on default settings and user trust. While Microsoft offers tools to mitigate the risk, most organisations haven’t configured them.

If you’re treating Teams like a walled garden, it’s time for a reality check — your next breach might start with a Teams ping.

Read More
Still Using Windows Server 2012? You Might As Well Leave the Door Wide Open
Noel Bradford Noel Bradford

Still Using Windows Server 2012? You Might As Well Leave the Door Wide Open

Still running Windows Server 2012 in 2025? You might as well leave your doors unlocked and shout “come on in” to attackers. End of life means no patches, no protection, and no excuse. This article explains why sticking with outdated infrastructure is a reckless liability, not a cost-saving strategy. From cyber insurance exclusions to ICO scrutiny and NCSC guidance, we break down the real-world risks UK businesses face.

You’ve been warned: unsupported systems aren’t just old — they’re dangerous. If your IT provider says otherwise, it’s time for a new one. This is your wake-up call.Still running Windows Server 2012 in 2025? You might as well leave your doors unlocked and shout “come on in” to attackers. End of life means no patches, no protection, and no excuse. This article explains why sticking with outdated infrastructure is a reckless liability, not a cost-saving strategy.

From cyber insurance exclusions to ICO scrutiny and NCSC guidance, we break down the real-world risks UK businesses face. You’ve been warned: unsupported systems aren’t just old — they’re dangerous. If your IT provider says otherwise, it’s time for a new one. This is your wake-up call.

Read More
Your Supplier Got Hacked! Now What? A Step-by-Step Guide for UK SMBs
Noel Bradford Noel Bradford

Your Supplier Got Hacked! Now What? A Step-by-Step Guide for UK SMBs

When your supplier suffers a cyber attack, it’s not just their mess to clean up — it can quickly become your problem too. This guide walks UK SMBs through exactly what to do if a supplier breach threatens your data, operations, or reputation.

From securing your systems and understanding GDPR obligations, to involving the right experts and tightening up contracts, you’ll learn how to stay one step ahead when the blast radius includes you.

Because in today's interconnected world, your security is only as strong as the weakest link in your supply chain — literally.

Read More
Google Chrome Hit by Critical ‘Use After Free’ Flaw: CVE-2025-3066 Explained
Noel Bradford Noel Bradford

Google Chrome Hit by Critical ‘Use After Free’ Flaw: CVE-2025-3066 Explained

Google has patched a critical "Use After Free" vulnerability in Chrome, tracked as CVE-2025-3066, which could allow remote code execution via malicious web pages. The flaw was found in Chrome's Site Isolation feature—meant to protect users—ironically making it a prime attack vector.

Users on versions prior to 135.0.7049.84/.85 (Windows/Mac) or 135.0.7049.84 (Linux) are urged to update immediately. Left unpatched, this bug could let attackers install malware, steal data, or worse.

This is yet another reminder that browser updates aren’t optional—they’re essential. Don’t be the low-hanging fruit. Check your version and patch now.

Read More
The Bigger They Are, the Harder You Fall
Noel Bradford Noel Bradford

The Bigger They Are, the Harder You Fall

They had the infrastructure. They had the trust. And they had the gall to cover up the very breach they caused. This isn’t fiction—it’s a real-world cybersecurity disaster involving a big-name MSP, a firewall misconfiguration, and a damning internal email that said “don’t tell the customer.”

Weeks later, the logs were useless, the excuses piled up, and the recovery bill is heading for six figures. If you think your MSP would never… think again. Here’s what went wrong, how it got exposed, and why a Cyber Essentials check could’ve stopped the whole mess cold.

Read More
Your Suppliers Are a Massive Cyber Risk (And You're Probably Letting Them In the Front Door)
Noel Bradford Noel Bradford

Your Suppliers Are a Massive Cyber Risk (And You're Probably Letting Them In the Front Door)

Think your cyber security is airtight? Doesn’t matter — your suppliers might be the ones getting you hacked. One dodgy vendor, one reused password, and suddenly your business is in the headlines for all the wrong reasons.

Supply chain attacks are exploding, and most businesses have no idea who actually has access to their systems. If you’re blindly trusting every outsourced service, freelancer, or cloud tool without asking hard questions, you’re basically inviting cybercriminals in for tea.

Want to know how bad it really is — and what you should be doing right now? Read this before it’s too late.

Read More
Windows 11’s April Update Quietly Installs Web Server Folder – Because Why the F*** Not?
Microsoft, Patch Tuesday News Desk Microsoft, Patch Tuesday News Desk

Windows 11’s April Update Quietly Installs Web Server Folder – Because Why the F*** Not?

Microsoft’s April 2025 Windows 11 update (KB5036893) has pulled a fast one, quietly creating a C:\inetpub folder on machines that have never had IIS installed. No changelog entry.

No heads-up. Just a mysterious web server directory suddenly appearing across the fleet. Whether you’re managing personal laptops or enterprise desktops, this isn’t just clutter—it’s a potential security red flag.

IT pros are furious, forums are lighting up, and Microsoft? Silent. Again. If you thought updates couldn’t get worse, think again.

Here’s why this bizarre move should have every sysadmin on high alert and reaching for the patch rollback button.

Read More
How to Stay Safe Online if You're at High Risk: NCSC's New Surveillance Guidance Explained
Noel Bradford Noel Bradford

How to Stay Safe Online if You're at High Risk: NCSC's New Surveillance Guidance Explained

The internet isn’t a safe space for everyone — especially if you’re a journalist, activist, or survivor of abuse. The UK’s National Cyber Security Centre (NCSC) has released new guidance for people and communities at high risk of digital surveillance. And unlike most government advice, this is actually worth reading.

It’s direct, useful, and designed for the real world — covering everything from encrypted messaging to avoiding spyware.

Whether you're at risk or supporting someone who is, this guide offers clear, practical steps to help you stay safer online when the consequences of being tracked could be life-altering.

Read More
April 2025 Patch Tuesday: What You Need to Know
News Desk News Desk

April 2025 Patch Tuesday: What You Need to Know

Act now or risk breach: Microsoft’s April 2025 Patch Tuesday just dropped with 121 fixes—and one is already being actively exploited in the wild. From remote desktop gateways to Office and authentication systems, these vulnerabilities target everything you rely on.

Think your network is safe? Think again. With privilege escalation bugs, Hyper-V escapes, and Kerberos enforcement changes, this update isn’t optional—it’s urgent.

Don’t let today’s Patch Tuesday become tomorrow’s security incident. Whether you’re an IT lead or managing critical systems, this one demands immediate attention. Read the full breakdown, patch fast, and stay one step ahead of Exploit Wednesday.

Read More

⚠️ Full Disclaimer

This is my personal blog. The views, opinions, and content shared here are mine and mine alone. They do not reflect or represent the views, beliefs, or policies of:

  • My employer

  • Any current or past clients, suppliers, or partners

  • Any other organisation I’m affiliated with in any capacity

Nothing here should be taken as formal advice — legal, technical, financial, or otherwise. If you’re making decisions for your business, always seek professional advice tailored to your situation.

Where I mention products, services, or companies, that’s based purely on my own experience and opinions — I’m not being paid to promote anything. If that ever changes, I’ll make it clear.

In short: This is my personal space to share my personal views. No one else is responsible for what’s written here — so if you have a problem with something, take it up with me, not my employer.