<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[VulWall]]></title><description><![CDATA[Cyber Security that speaks human.
Weekly actionable, jargon-free insights on cybersecurity, compliance, and threat prevention—helping startups and SMBs stay secure without the noise.]]></description><link>https://newsletter.vulwall.com</link><image><url>https://substackcdn.com/image/fetch/$s_!YBw7!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F645fb9eb-287c-473e-a30f-49b8d888b505_1280x1280.png</url><title>VulWall</title><link>https://newsletter.vulwall.com</link></image><generator>Substack</generator><lastBuildDate>Wed, 06 May 2026 11:02:51 GMT</lastBuildDate><atom:link href="https://newsletter.vulwall.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Mojtaba Tajik]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[vulwall@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[vulwall@substack.com]]></itunes:email><itunes:name><![CDATA[Moji]]></itunes:name></itunes:owner><itunes:author><![CDATA[Moji]]></itunes:author><googleplay:owner><![CDATA[vulwall@substack.com]]></googleplay:owner><googleplay:email><![CDATA[vulwall@substack.com]]></googleplay:email><googleplay:author><![CDATA[Moji]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Don’t Let VPNs Be Your Only Line of Defence]]></title><description><![CDATA[Relying solely on a VPN for remote work security is like putting a padlock on your front door while leaving the side windows open.]]></description><link>https://newsletter.vulwall.com/p/dont-let-vpns-be-your-only-line-of</link><guid isPermaLink="false">https://newsletter.vulwall.com/p/dont-let-vpns-be-your-only-line-of</guid><dc:creator><![CDATA[Moji]]></dc:creator><pubDate>Thu, 05 Jun 2025 09:00:43 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/ecabaf4e-f8bd-454e-ab36-beeaa600119b_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Relying solely on a VPN for remote work security is like putting a padlock on your front door while leaving the side windows open. It may keep casual threats out, but modern attackers are looking for soft spots, and remote teams often have plenty.</p><p><strong>Here&#8217;s the problem:</strong><br>Once someone is &#8220;on the VPN,&#8221; they&#8217;re often trusted implicitly. But that device might be unpatched, infected, or even stolen. One cracked password later, and you&#8217;ve got a foothold inside your network.</p><p><strong>Here&#8217;s how to level up:</strong><br>You don&#8217;t need an enterprise budget to apply Zero Trust principles:</p><ol><li><p><strong>Start with Device Trust</strong><br>Use tools like <strong>Tailscale</strong> or <strong>Cloudflare Access</strong> to enforce device posture &#8212; only allow logins from healthy, known devices.</p></li><li><p><strong>Go Passwordless</strong><br>Enable <strong>FIDO2/WebAuthn</strong> for sensitive logins. Most cloud platforms support it, and it's a significant improvement over SMS codes.</p></li><li><p><strong>Use Conditional Access</strong><br>With <strong>Google Workspace</strong> or <strong>Azure AD</strong>, you can block access based on geography, IP reputation, or device risk.</p></li><li><p><strong>Split and Isolate</strong><br>Don&#8217;t give VPN users access to your whole network&#8212;segment by role, app, or environment using firewalls or cloud-native security groups.</p></li></ol><p><strong>Takeaway:</strong><br>VPNs are a great tool &#8212; just don&#8217;t treat them like a security silver bullet. Layer up, check device trust, and make attackers work <em>a lot</em> harder.</p><p>Try adding device checks to your VPN this week. It&#8217;s easier than you think &#8212; and way safer.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.vulwall.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading VulWall! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Cost of Data Breaches: How to Prevent and Mitigate Losses]]></title><description><![CDATA[Imagine waking up to a Slack message:]]></description><link>https://newsletter.vulwall.com/p/cost-of-data-breaches-how-to-prevent</link><guid isPermaLink="false">https://newsletter.vulwall.com/p/cost-of-data-breaches-how-to-prevent</guid><dc:creator><![CDATA[Moji]]></dc:creator><pubDate>Thu, 29 May 2025 09:01:24 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!YBw7!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F645fb9eb-287c-473e-a30f-49b8d888b505_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Imagine waking up to a Slack message: </p><p><strong>&#8220;We&#8217;ve had a breach.&#8221; </strong></p><p>Not a great way to start your day, especially when the average cost of a data breach now <strong>exceeds $4.9 million</strong>, based on the <a href="https://www.ibm.com/reports/data-breach">IBM data breach report</a>. </p><p>For smaller SaaS or fintech startups, that number is more than a blow&#8212;it&#8217;s potentially fatal.</p><p>But here's the good news: Most breaches don&#8217;t come from nation-state attacks. They come from basic oversights. And that means they can be prevented.</p><p>&#128737;&#65039; <strong>4 Practical Moves to Reduce Breach Risks</strong></p><ul><li><p><strong>Start with Access Hygiene:</strong> Stop giving everyone keys to every room.</p><ul><li><p>Use role-based access control (RBAC).</p></li><li><p>Remove access for ex-employees (set up auto-expiry policies).</p></li><li><p>Avoid using shared logins for admin tools.</p></li></ul></li><li><p><strong>Encrypt, Always:</strong> Data at rest and in transit should be encrypted.</p><ul><li><p>Use HTTPS everywhere.</p></li><li><p>Encrypt your databases&#8212;don&#8217;t just rely on cloud provider defaults.</p></li></ul></li><li><p><strong>Turn on Alerts, Not Just Logs:</strong></p><ul><li><p>Set up alerts for suspicious logins, especially those occurring after hours or from new locations.</p></li><li><p>Utilise tools such as AWS GuardDuty, Azure Defender, or even basic SIEM tools.</p></li></ul></li><li><p><strong>Assume Breach, Test Recovery:</strong> Prevention is great, but resilience matters more.</p><ul><li><p>Run tabletop incident response drills quarterly.</p></li><li><p>Ensure off-site encrypted backups exist, and test restores.</p></li></ul></li></ul><p>&#129504; <strong>Key Takeaways</strong></p><ul><li><p>Breaches cost more than just money&#8212;they burn customer trust.</p></li><li><p>Basic security hygiene goes a long way.</p></li><li><p>You don&#8217;t need an army&#8212;just a clear process, good defaults, and regular check-ins.</p></li></ul><p><strong>Know more, risk less.</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.vulwall.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading VulWall! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Essential Business Security Checklist: 5 Must-Dos This Week]]></title><description><![CDATA[In today's fast-paced digital world, securing your business can feel like a daunting task, especially when you don't have a dedicated security team.]]></description><link>https://newsletter.vulwall.com/p/5-security-must-dos-this-week</link><guid isPermaLink="false">https://newsletter.vulwall.com/p/5-security-must-dos-this-week</guid><dc:creator><![CDATA[Moji]]></dc:creator><pubDate>Thu, 22 May 2025 09:01:40 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!YBw7!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F645fb9eb-287c-473e-a30f-49b8d888b505_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In today's fast-paced digital world, securing your business can feel like a daunting task, especially when you don't have a dedicated security team. You're focused on growth, innovation, and serving your customers, and cybersecurity often ends up feeling like another complex thing to worry about.</p><p>But here's the good news: you don't need to be a cybersecurity expert to significantly improve your company's defences. Taking a few simple, consistent steps can make a world of difference.</p><p>This week, let's tackle security with a straightforward checklist. These aren't complex technical hurdles; they're practical actions you can implement right away to protect your business from common threats.</p><div><hr></div><p><strong>Your 5-Step Security Checklist for This Week:</strong></p><ol><li><p><strong>Strengthen Your Passwords (and Use a Manager!):</strong></p><ul><li><p><strong>Why it matters:</strong> Weak or reused passwords are a hacker's easiest entry point. Think of your password as the key to your business &#8211; make it strong and unique for every lock.</p></li><li><p><strong>Action:</strong> Encourage all employees to use strong, unique passwords (20+ characters, mix of letters, numbers, symbols) for every business account. Even better, look into a reputable password manager for your team. It makes strong passwords easy to manage and share securely.</p></li></ul></li><li><p><strong>Enable Two-Factor Authentication (2FA) Everywhere Possible:</strong></p><ul><li><p><strong>Why it matters:</strong> Even if a hacker gets a password, 2FA (like a code sent to your phone) is an extra layer of defence that often stops them cold.</p></li><li><p><strong>Action:</strong> Check your email, cloud storage (Google Drive, Dropbox, etc.), accounting software, and social media accounts. Turn on 2FA for all business-critical platforms. It&#8217;s usually a quick setting change!</p></li></ul></li><li><p><strong>Back Up Your Critical Data Regularly:</strong></p><ul><li><p><strong>Why it matters:</strong> Accidents happen, systems fail, and ransomware attacks can lock you out of your data. A recent, reliable backup is your safety net.</p></li><li><p><strong>Action:</strong> Ensure all essential business data (customer lists, financial records, important documents) is backed up automatically to a secure, off-site location (like a cloud backup service). Test your backups occasionally to ensure they work!</p></li></ul></li><li><p><strong>Educate Your Team on Phishing Scams:</strong></p><ul><li><p><strong>Why it matters:</strong> Most cyberattacks start with a deceptive email (phishing). Your employees are your first line of defence!</p></li><li><p><strong>Action:</strong> Dedicate 5-10 minutes to talk to your team about phishing. Remind them to be suspicious of unexpected emails, verify senders, and never click on suspicious links or open attachments. A quick internal memo or a brief team huddle can go a long way.</p></li></ul></li><li><p><strong>Keep Your Software Updated:</strong></p><ul><li><p><strong>Why it matters:</strong> Software updates often include critical security patches that fix vulnerabilities hackers exploit. Running outdated software is like leaving your doors unlocked.</p></li><li><p><strong>Action:</strong> Make sure operating systems (Windows, macOS), web browsers, and all business applications are set to update automatically or that someone is regularly checking for and installing updates.</p></li></ul></li></ol><div><hr></div><p>Implementing these five steps this week won't make you impenetrable, but it will significantly reduce your risk and build a stronger foundation for your digital security. It's about proactive protection, not just reactive damage control.</p><p>We're passionate about making cybersecurity accessible and effective for businesses like yours. Stay tuned for more practical tips and insights designed for leaders who want to focus on what they do best, knowing their digital assets are protected.</p><p><strong>Know more, risk less.</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.vulwall.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading VulWall! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[SaaS Security – A Primer]]></title><description><![CDATA[Why Securing Your SaaS Platform Should Be a Priority From Day One]]></description><link>https://newsletter.vulwall.com/p/saas-security-a-primer</link><guid isPermaLink="false">https://newsletter.vulwall.com/p/saas-security-a-primer</guid><dc:creator><![CDATA[Moji]]></dc:creator><pubDate>Wed, 14 May 2025 09:38:33 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!YBw7!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F645fb9eb-287c-473e-a30f-49b8d888b505_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>As a <strong>growing company</strong>, security is often top of mind, but the complexity of securing a SaaS platform can feel overwhelming. The good news is that securing your SaaS doesn&#8217;t have to be a lengthy, complicated process. By following a few straightforward steps, you can significantly improve your platform&#8217;s security today.</p><p>I know firsthand how tough it can be to balance security with the day-to-day pressures of running a growing company. You want to scale quickly, but you also need to make sure your platform is secure. Over the years, I&#8217;ve learned that even small, simple security measures can have a huge impact down the road. In this newsletter series, I&#8217;ll guide you through the essential steps to start securing your SaaS platform today, without feeling overwhelmed.</p><h3><strong>What Is SaaS Security?</strong></h3><p>SaaS security refers to the practices, tools, and protocols you put in place to protect your platform and the data it handles. Since your platform likely processes sensitive user data, it&#8217;s essential to have solid security measures in place from the beginning.</p><h3><strong>Why Should You Care About SaaS Security?</strong></h3><ol><li><p><strong>Trust &amp; Reputation</strong>: A security breach can damage your credibility and erode customers&#8217; trust.</p></li><li><p><strong>Compliance</strong>: Legal frameworks (e.g., GDPR, HIPAA) may require you to meet security standards.</p></li><li><p><strong>Financial Risks</strong>: Breaches can lead to costly fines, downtime, and lost business.</p></li></ol><h3><strong>Starting With Security</strong></h3><p>The best time to focus on security is <em>now</em>. Don&#8217;t wait until your platform is under attack to implement safeguards. Over the next few weeks, we&#8217;ll dive into security practices and show you how to apply them quickly and simply, ensuring your platform stays secure without overwhelming your team.</p><div><hr></div><h3><strong>Final Thoughts</strong></h3><p>By making security a priority early on, you&#8217;ll safeguard your platform and your users' data while building long-term trust. Stay tuned for actionable tips in future posts that will help you further secure your platform.</p><p><strong>Know more, risk less.</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.vulwall.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading VulWall! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>