blog, events and news
Filtered By: cyber-protection
Certificate management processes
Certificates are now used all of the time within the IT industry, they confirm our websites identity, are used to sign emails and even used ...
MoreWhat is Phishing and what can you do to prevent it?
Phishing is a type of online scam where criminals send an email that appears to be from a legitimate company and ask you to provide sensitiv...
MoreMost Worrisome Threats To Enterprise Security (2020 forecast)
Ultimately, the best protection against the ever-increasing sophistication and complications of technology threats is knowledge. And with 20...
MoreFound malware, now what do you do?
You’ve found some malware on your computer, so what should you do next? What’s the best approach? We’ll run through a few things that will g...
MoreData breaches and other scary 2019 events- Special Halloween post
It’s that time of the year again, where the ghosts come out of the cupboard and the witches cackle. These are the scariest parts of cyber se...
MoreHow to get your cyber security budget approved by the board
There’s a few ways to improve the approach to the company board that will significantly help to get them onboard with improving cyber securi...
MoreNational Cyber Security awareness month
The month of October is a very important month in the calendar for the security industry. October is known as the (NCSAM) national cyber sec...
MoreHow to start a career in the security industry
There’s usually three ways into any job role. They are education, experience and self study. This post looks at how they work in the cyber a...
MoreGuest blog- A career in Information security or Cyber security
The computing industry for Information and Cyber Security has rapidly grown over the last decade
MoreTop 5 Anti-Virus Software
On the market there is a wide range of vendors supplying and developing anti-virus products.We speak here about some of these
MoreProtecting your business in the cyber security era
Almost every day we hear reports of businesses being impacted by a lack of effective cyber security practices; often causing financial losse...
MoreTech Jargon Buster. Understand the tech lingo so you pick the right thing for your company
We explain to you here what the most common terms mean
MoreCaught you watching p*rn!
Meet Jack. Last week, Jack received an email from a stranger. It said that the stranger had managed to hack into Jack’s laptop and caught hi...
MoreEquifax Data breach
Back in 2017, Equifax suffered the largest data breach of history, exposing the data of approximately 150 million people. It was the consume...
MoreCase Study: Maersk Ransomware Attack
You might take Cyber Security seriously, but how about your suppliers? Here is why you need to secure your supply chain, now.
More