Category

Internet Security
Spyware is a type of malware that infects your PC or mobile device and gathers information about you, including the sites you go to, usernames and passwords, payment information, and the emails you send and receive. Similarly, stalkerware is a type of software or application that spies on victims. Stalkerware apps are capable of a plethora...
Read More
VPNs (Virtual Private Networks) in theory provide anonymity and secure passage to your online destination. What we’ve increasingly seen is VPN companies go through their own security breaches and exposing users internet logs. Even when a VPN provider claims that it keeps no logs, it can simply be marketing in a way where that might...
Read More
Data breaches are events where certain confidential information is accessed without proper authorization. this goes further by having copies of that data distributed. The average data breach in 2020 caused roughly 3.92 million (USD) in damages. The core concept of a data breach is the fact that data confidentiality has been compromised. Data breaches can...
Read More
Security Posture A lot of the time we like to think that adding a new tool or creating a new policy will start to cover our bases and make us less vulnerable. While that can be true in a lot of cases, we often tend to overlook system interaction changes and a plethora of other...
Read More
We covered “Email Phishing” last week, and a threat that is commonly found in conjuncture with Email phishing is “Ransomware”. Ransomware is a type of malware that is designed to encrypt data on an infected machine and deny access to it. Most of the time it has a “ransom” to be paid to decrypt it,...
Read More
This article is the start of a series of articles concerning “Common Cyber Threats” that affect organizations today. We’ll go over how these threats work, what types of threats there are, and some common ways to spot and mitigate damage from these threat types. Today we’ll start with Email Phishing. When people think of cyberattacks,...
Read More
Remote working is becoming necessary in this quickly changing business climate. As we move our workforce from within our offices to within their living room, the security foundations we’ve established to protect our infrastructure and data at the office must also migrate with remote working. The movement has been rapid. Only a few businesses were...
Read More
There are many types of exploits cyber criminals can use for various nefarious purposes. These exploits are vastly different in terms of how they work but the one common denominator between them is they all exploit vulnerable systems within the technology we use every day. Some exploits can be defined by the intended purpose of...
Read More
Not all cyber security risks come from malware, viruses, or software vulnerabilities. One of the most grievous risks is a bit more obvious. Keeping passwords on post-it notes or in notepad files might be one of the most easy to recognize vulnerabilities you could discuss in a cyber security setting. Yet studies show it is...
Read More
https://www.cisomag.com/6-practices-to-strengthen-your-password-hygiene-in-2020/ By Rudra Srinivas The National Cyber Security Centre (NCSC) of the United Kingdom recently issued a warning to its citizens to have stronger and unique passwords after releasing a file that contained the top 100,000 commonly hacked passwords from the “Have I Been Pwned” data set. With unprotected databases and online services getting breached often, leaked/stolen passwords from...
Read More
1 2 3 5