Trending
Heat Index
Resources
Most Recent
 
Read More
March 15, 2019

Who Has The Keys To Your Kingdom?

Cyber Security is a key aspect we need to look at in today’s connected world, from our children finding entertainment on YouTube to major businesses transferring billions over the internet. Often overlooked is who has access to what?

An IT Department / IT Company is often trusted with secure passwords to access all their systems, this is fine but you should have checks in place to make sure a single employee doesn’t control access. Such as in a case in the USA, a college fired an employee and the password was then held to ransom for $200,000.

We provide some guidelines to follow below.

Make Sure No Personal Addresses Are Used As A Recovery Option

A [...]

 
Read More
December 2, 2018

Does Someone Have Your Password?

Is Your Password safe? Recently there have been breaches resulting in passwords being leaked on the Internet, we ask does someone have my password?

Hearing about breaches are becoming a consistent thing that we suddenly hear about after the fact. Facebook was recently affected and many other companies. Have you considered if you are safe? Unfortunately all too frequently people use the same password for every website. Safety when it comes to passwords still has a long way to go until people realise the seriousness.

Why Should I Care If One Website Was Breached?

One website breached with a unique password wouldn’t be a big deal, but do you think you really used a unique [...]

110
 
Read More
November 25, 2018

Should You Pay When Attacked By Ransomware?

No one likes to admit when they are attacked, the emotions you would be going through. I ask though could you survive with a loss of the data or?should you pay when attacked by Ransomware?

Being a victim of Ransomware wouldn’t be something any of us want to face. Your files getting encrypted and suddenly becoming faced with a dilemma of should we pay or not? Studies have shown 70% of business are paying to get their data back but not all cyber criminals return the encryption keys. Before you make a decision, consider these key facts.

Can You Trust Them?

You are dealing with cyber criminals after all. They used an infection to encrypt your data and now you are relying on [...]

42
 
Read More
November 21, 2018

You Need 2-Factor Authentication

The News About Data Breaches And Hacking Is Everywhere. It Is Very Important To Keep Up Security And We Show You Why You Need 2-Factor Authentication

I feel barely a week goes by and we hear about another major breach, often it is personal data. Unfortunately more frequently we hear of either data breaches from phishing attempts, workers accidentally leaving company devices in public places and hacking attempts leaving companies with a potentially catastrophic situation for their business.

One common way accounts are breached is through e-mail and the use of phishing, for example there are many fake e-mails who pose as Microsoft and target users by pretending to present the [...]

76
error: Protected