Cold Boot Attacks rearing their ugly heads again  

  An updated version of the Cold Boot Attack allows hackers to bypass security mechanisms and access data that remain in memory after a machine shuts down. Modern machines from

Share
The real value of your data

  Over and over, you’ve probably been advised that you should protect your private data. This typically means that, in addition to updated application and internet security software, you should use a trusted VPN that

Share
Spam is on the rise – Again!

  Email spam is once again the most popular choice for sending out malware. If you’re going to encounter malware in 2018, chances are it will happen through spam. Digital

Share
The importance of finding connections in the Global Village

  Global Village, a phrase originally framed by Marshall Mcluhan, is defined as: “the world viewed as a community in which distance and isolation have been dramatically reduced by electronic

Share
The importance of keeping your website updated

  You’ve recently contracted a company to design a very attractive and professional-looking new website for your business and did some Search Engine Optimisation (SEO) editing to make sure that

Share
How to help protect your business against cyber crime

  One of the biggest threats facing businesses today is cyber crime, which organisations now need to take very seriously. However many businesses are still unaware of how to go

Share
The Pros & Cons of a Bring Your Own Device Policy

  The Bring Your Own Device (BYOD) trend is all about companies allowing employees to bring their own devices to work to be used for work purposes. For many organisations,

Share
How SaaS benefits your organisation

  Software as a Service (SaaS) has proven to be a successful software delivery platform over the past few years. Gartner defines SaaS as “software that is owned, delivered and managed remotely

Share
How to combat the cybersecurity skills shortage in your organisation

  Internet access has grown exponentially over the past decade as rapid advances in technology have facilitated how we live today. Internet of Things (IoT) devices are also everywhere now,

Share
Macros can be dangerous for your network

  Microsoft Office documents containing macros can be hazardous to the overall security of your network. Macros are bits of computer code used to automatically perform repeated tasks and historically

Share