Top Cybersecurity threats to look out for in 2019

  Network outages, hacking, computer viruses and other malware affect our lives in ways that range from inconvenience to the potentially devastating loss of income and/or assets. As the number

Share
Massive Marriott Hack

  The hotel heavyweight Marriott announced a massive hack on 30 November 2018 that impacted as many as 500 million customers who made a reservation at a Starwood hotel. This intrusion that caused the

Share
3 Ways to Help Keep IT Systems Secure 

Technology continues to present new opportunities for business owners. Increased mobility and productivity offered by these platforms are just some of the advantages of moving business online. As useful as

Share
Be prepared with incident management for your business

  Breaches happen, but most companies are not prepared. An incident is an unexpected disruption to a service. It disturbs the normal operation thus affecting end user’s productivity. An Incident

Share
How to detect a Targeted Cyber Attack

  A targeted attack is any malicious attack that is targeted at a specific individual, company, system or software. Targeted cyber attacks are considered higher risk with higher rewards for attackers than the average random

Share
Stop data breaches with managed detection and response

  The online threat landscape has changed drastically. Advanced attacks, spear-phishing and data breaches are, unfortunately, pretty much the norm today. With cyber attacks growing more advanced day by day,

Share
Vulnerability Management 101

  Managing vulnerabilities in a company network is an endless task that is compounded by the limited manpower that many companies experience as a result of the cyber security skills shortage.

Share
How to stay on top of data breaches

  Data breaches have become a known and realistic hurdle that every business should prepare for. In addition to compromised information, data breaches come with a variety of negative consequences.

Share
The importance of reading the T&C’s to avoid unpleasant consequences

  The terms and conditions (T&C’s) for the services you use may not be a priority to you, but perhaps they should be. The importance of thoroughly reading T&C’s before

Share
What it takes to become an ethical hacker

  Jobs in the cyber security market are on a steady incline with the increase in internet usage worldwide together with the demand for a skilled workforce to accommodate this

Share