Password protection is the way forward

Password protection is the way forward

Password protection is the way forward  Creating strong passwords has become the biggest burden of today’s generation. So many different accounts are created during the online “struggle” to have access to all the services available to us; but keeping track of the multiple usernames and passwords becomes too overwhelming for ... Read more

Use Customer Data to Gain a Competitive Advantage

Use Customer Data to Gain a Competitive Advantage  Data is an asset. Most modern websites collect email addresses in exchange for free downloads to gain more customer data. This is a great way in getting this information, but do you know where else to look for data? Once data collected, ... Read more

Is cyber security an issue for the IT department? 

Is cyber security an issue for only the IT department?    Cyber security is generally based on the specialised controls initiated in the technical department to protect data held inside an organisation. The greatest issue today, however, is concerning users of the frameworks where this data is held. The users represent ... Read more

What is Cyber Risk Insurance (CRI)?

What is Cyber Risk Insurance (CRI)?  With the way organisations conduct business and reach out to prospective customers today, internet security has become imperative. Technology, social media and online banking contribute to the new culture of moving everything online. These methods make us more susceptible to cyber attacks. The damage ... Read more

The latest threat in the online landscape – PUAs (Potentially Unwanted Applications)

The latest threat in the online landscape - PUAs (Potentially Unwanted Applications)    PUA is a term used to describe an application that, while not malicious, is generally considered unsuitable for business networks. Free software always comes with a catch. Examples of these inconveniences include browser extensions or other software that ... Read more

3 Ways to Keep IT Systems Secure

3 Ways to Help Keep IT Systems Secure    Technology continues to present new opportunities for business owners. Increased mobility and productivity offered by these platforms are just some of the advantages of moving business online. As useful as all these modern inventions are though, they also present growing security concerns.   Online ... Read more

Everything you need to know about “Krack Attacks”

Everything you need to know about “Krack Attacks”   A major new security flaw has been discovered and it affects practically everyone that uses wi-fi. It’s called Krack, short for Key Reinstallation Attack, and is basically a way for hackers to decrypt and spy on anything you do online. The security ... Read more

Fight Phishing with ONE effective method

Fight Phishing with ONE effective method     Phishing is a serious security problem. It is when a hacker attempts to obtain sensitive information by disguising themselves as a trustworthy entity, most commonly in the form of an email. The severity of this problem is often due to hackers using this information ... Read more

RANSOMWARE: HOW TO PREDICT, PREVENT, DETECT & RESPOND

RANSOMWARE: HOW TO PREDICT, PREVENT, DETECT & RESPOND    Ransomware is one of the most prominent cyber threats today. Yet just like any other threat, F-Secure advocates for a four-phase approach to cyber security - Predict, Prevent, Detect, and Respond – that can help an organisation defend against, cope with or ... Read more

Does ethical hacking exist?

Does ethical hacking exist?  The technical definition of ethical hacking is what distinguishes the true meaning of the term. Ethical hacking is when a company pays a security expert to hack into its own systems, which is perfectly legal. It’s a way to test out their security infrastructure and see ... Read more
Next Page »