Phil Muncaster

Phil Muncaster

IT Journalist


Phil has been an IT journalist for over 16 years. He started out as a reporter on UK enterprise IT title IT Week and then Computing in 2005 and moved up to the role of News Editor before leaving to pursue a freelance career. Since then, Phil has written for titles including The Register, where he worked as Asia correspondent from Hong Kong for over two years, MIT Technology Review, SC Magazine, and others. In addition to contributing to WeLiveSecurity, he also writes for InfoSecurity Magazine, IDG Connect and a range of other IT news and feature sites.


127 articles by Phil Muncaster

How To

What to do if you receive a data breach notice

What to do if you receive a data breach notice

How To

What to do if you receive a data breach notice

Receiving a breach notification doesn’t mean you’re doomed – here’s what you should consider doing in the hours and days after learning that your personal data has been exposed

Phil Muncaster22 Nov 20215 min. read


Digital Security

When the alarms go off: 10 key steps to take after a data breach

When the alarms go off: 10 key steps to take after a data breach

Digital Security

When the alarms go off: 10 key steps to take after a data breach

It’s often said that data breaches are no longer a matter of ‘if’, but ‘when’ – here’s what your organization should do, and avoid doing, in the case of a breach

Phil Muncaster11 Nov 20215 min. read


Business Security

Passwordless authentication: Is your company ready to move beyond passwords?

Passwordless authentication: Is your company ready to move beyond passwords?

Business Security

Passwordless authentication: Is your company ready to move beyond passwords?

Are the days numbered for ‘123456’? As Microsoft further nudges the world away from passwords, here’s what your organization should consider before going password-free.

Phil Muncaster08 Nov 20214 min. read


Business Security

Putting cybersecurity first: Why secure-by-design must be the norm

Putting cybersecurity first: Why secure-by-design must be the norm

Business Security

Putting cybersecurity first: Why secure-by-design must be the norm

Organizations that aim to pull ahead of the competition need to develop a strong security culture from top to bottom

Phil Muncaster26 Oct 20214 min. read


Business Security

What’s lurking in the shadows? How to manage the security risks of shadow IT

What’s lurking in the shadows? How to manage the security risks of shadow IT

Business Security

What’s lurking in the shadows? How to manage the security risks of shadow IT

Employee use of unsanctioned hardware and software is an increasingly acute problem in the remote and hybrid work era

Phil Muncaster22 Oct 20215 min. read


Business Security

Employee offboarding: Why companies must close a crucial gap in their security strategy

Employee offboarding: Why companies must close a crucial gap in their security strategy

Business Security

Employee offboarding: Why companies must close a crucial gap in their security strategy

There are various ways a departing employee could put your organization at risk of a data breach. How do you offboard employees the right way and ensure your data remains safe?

Phil Muncaster14 Oct 20214 min. read


Business Security

Plugging the holes: How to prevent corporate data leaks in the cloud

Plugging the holes: How to prevent corporate data leaks in the cloud

Business Security

Plugging the holes: How to prevent corporate data leaks in the cloud

Misconfigurations of cloud resources can lead to various security incidents and ultimately cost your organization dearly. Here’s what you can do to prevent cloud configuration conundrums.

Phil Muncaster22 Sep 20214 min. read


Digital Security

What is an attack surface and how can you reduce it?

What is an attack surface and how can you reduce it?

Digital Security

What is an attack surface and how can you reduce it?

Discover the best ways to mitigate your organization's attack surface, in order to maximize cybersecurity.

Phil Muncaster14 Sep 20214 min. read


Less Technical

Beyond the pandemic: Why are data breach costs at an all-time high?

Beyond the pandemic: Why are data breach costs at an all-time high?

Less Technical

Beyond the pandemic: Why are data breach costs at an all-time high?

It might be tempting to blame the record-high costs of data breaches on the COVID-19 pandemic alone. But dig deeper and a more nuanced picture emerges.

Phil Muncaster27 Aug 20214 min. read