Cyber Security and Network Administration

Tutorials and Explainers

Cipher

Evaluating Multi Factor Authentication Methods

It's 2026, and identity is the new perimeter. The Crowdstrike Global Threat Report 2025 focuses heavily on the identity and key methods used to compromise accounts. Sure, attackers and bots are still hammering away at public IP addresses, looking for that RDP server you forgot…

Continue reading...
Cipher

Email Security Basics: SPF, DKIM and DMARC

I'm currently locked in a battle with a senior member of our organisation who is annoyed that someone they contact regularly at another organisation gets quarantined by our email security. Do you want to know why? They are not sending from an IP address specified…

Continue reading...
Cipher

Weekly Post #1 - 02/01/2026

It seems fitting that the first post of this blog is being written (if not published) on the first day of a new year. I've toyed with idea the of starting a blog for a long time now but I finally decided it was time…

Continue reading...
Cipher

Identifying Devices by their MAC Address

Ever wondered how your router knows your iPhone from your smart fridge, or how coffee shop Wi-Fi remembers you? It all comes down to the MAC (Media Access Control) Address. While an IP address is like your mailing address (where you are currently located), a…

Continue reading...