Is the future Passwordless?

  Nearly all data breaches begin with compromised passwords, yet the importance of passwords is still being underplayed in society today. Passwords have infamously been dubbed as the weakest link

Share
Top Cybersecurity threats to look out for in 2019

  Network outages, hacking, computer viruses and other malware affect our lives in ways that range from inconvenience to the potentially devastating loss of income and/or assets. As the number

Share
Massive Marriott Hack

  The hotel heavyweight Marriott announced a massive hack on 30 November 2018 that impacted as many as 500 million customers who made a reservation at a Starwood hotel. This intrusion that caused the

Share
3 Ways to Help Keep IT Systems Secure 

Technology continues to present new opportunities for business owners. Increased mobility and productivity offered by these platforms are just some of the advantages of moving business online. As useful as

Share
Be prepared with incident management for your business

  Breaches happen, but most companies are not prepared. An incident is an unexpected disruption to a service. It disturbs the normal operation thus affecting end user’s productivity. An Incident

Share
How to detect a Targeted Cyber Attack

  A targeted attack is any malicious attack that is targeted at a specific individual, company, system or software. Targeted cyber attacks are considered higher risk with higher rewards for attackers than the average random

Share
3 Ways to ensure cyber security hygiene

  Operational Security is a great way to support a cyber security culture in your organisation, allowing employees to feel safer in their working space, but it can also lead

Share
Stop data breaches with managed detection and response

  The online threat landscape has changed drastically. Advanced attacks, spear-phishing and data breaches are, unfortunately, pretty much the norm today. With cyber attacks growing more advanced day by day,

Share
Shut Down, Sleep or Hibernate – how vulnerable is your computer in these stages?

  Computers can sleep, hibernate or shut down. Some people leave their computers running 24/7, while others shut down their computers the moment they step away. Laptops in particular require

Share
Vulnerability Management 101

  Managing vulnerabilities in a company network is an endless task that is compounded by the limited manpower that many companies experience as a result of the cyber security skills shortage.

Share