blog, events and news
Latest
How to uncover network vulnerabilities
If you are new in IT and want to know where to start finding vulnerabilities on the network you're managing this blog post might be for you.
MoreProtecting your identity online
Is it possible to really protect your identity online? How do “you” protect your identity online and how do others that have your identifica...
MoreWhat is a VPN and why do you need one?
We tell you in this post why it is useful to have a VPN connection
MoreQuick tips to improve your board’s cybersecurity
For some CISOs, it is a challenge to communicate your priorities to the board. We provide you here with some quick tips to ensure your board...
MoreWhat is a Password Manager and the best password managers around?
Remembering passwords is hard, we tell you how to store and share passwords safely with password management software
MoreHow to make of your employees the best line of cyber defence against cyberattacks
How to make of your employees the best line of cyber defence against cyberattacks by creating a company culture that promotes cybersecurity
MoreCertificate management processes
Certificates are now used all of the time within the IT industry, they confirm our websites identity, are used to sign emails and even used ...
MoreWhat is Phishing and what can you do to prevent it?
Phishing is a type of online scam where criminals send an email that appears to be from a legitimate company and ask you to provide sensitiv...
MoreMost Worrisome Threats To Enterprise Security (2020 forecast)
Ultimately, the best protection against the ever-increasing sophistication and complications of technology threats is knowledge. And with 20...
MoreFound malware, now what do you do?
You’ve found some malware on your computer, so what should you do next? What’s the best approach? We’ll run through a few things that will g...
MoreData breaches and other scary 2019 events- Special Halloween post
It’s that time of the year again, where the ghosts come out of the cupboard and the witches cackle. These are the scariest parts of cyber se...
MoreHow to get your cyber security budget approved by the board
There’s a few ways to improve the approach to the company board that will significantly help to get them onboard with improving cyber securi...
MoreNational Cyber Security awareness month
The month of October is a very important month in the calendar for the security industry. October is known as the (NCSAM) national cyber sec...
MoreHow to start a career in the security industry
There’s usually three ways into any job role. They are education, experience and self study. This post looks at how they work in the cyber a...
MoreGuest blog- A career in Information security or Cyber security
The computing industry for Information and Cyber Security has rapidly grown over the last decade
More