cyber security
-
November 2017
"So much malware, what do I do?"
Malware is the common term covering all malicous programs written with the intent of obtaining data and corrupting a system. Below is a list of the different variants you need to be aware of: Macro viruses Written in macro language such as VBS (Visual Basic Scripting). Macro Viruses are usually pla… read more
-
November 2017
Will GDPR change the way content censorship is regulated in the UK?
Internet censorship isn't exclusive to places in the middle and far east like Iran and China. It exists in a myriad of variants in many places in the west as well. In Canada, the supreme court ruled in favour of a temporary mandate requirement for results of a competing company to be removed not onl… read more
-
November 2017
The Top 3 things you need to stay safe online
What are the top 3 things you need to stay safe online? Anti-virus? Visiting only known websites? Deleting cookies? Changing passwords? If any of the above were in your top 3 then I have news for you - you are NOT doing the best things to secure yourself online. There is a HUGE gulf between what eve… read more
-
November 2017
As a business owner, are you aware if..
If your staff possess the know-how to protect your business from cyber criminals? If your systems are sophisticated in simplicity, yet multi-layered enough to protect your assets? To what degree is your business effective in responding to a computer hack? Once upon a time, the word ‘hacker… read more
-
November 2017
Pivotal factors that weaken your security
Cyber Security is a bit like a game of chess; a game of offensive and defensive strategies. Considering a hacker spends more time contemplating how to penetrate weakened systems and how to identify them than the majority of people spend learning how to defend themselves against a cyber attack; fortu… read more
-
November 2017
Why you need cyber security - How hackers value your data
Why would someone want to hack you? What is the point of a hacker taking over your PC? Both very good questions. However, we must understand it is no longer a human who is attacking you. Yes - a human has created what is attacking you by either writing or buying automated programs. Yes - it is a per… read more
-
October 2017
Any web app can infect your computer - Here's how to avoid the pitfalls
Most people nowadays are equipped with some form of computing device - laptop, desktop, smartphone or tablet. I'm willing to throw my two eggs at the wall and say 80% of those people have very little insight into their device and how weak their security is regarding their personal privacy. I could b… read more
-
October 2017
3 Fundamentals of Security
Building a perimeter of anti-virus applications is not feasible in this digital era as many anti-virus apps are in fact loaded with malware. It has a friendly face then out of nowhere... POW! It does you in your unpatched vulnerability. Cyber Security boils down to three fundamentals: Prevention, De… read more
-
October 2017
Who Wins... Security, Privacy Or Anonymity? You decide!
These days, life is like a reality show for all of us. The surge in popularity of social media platforms has resulted in a parrallel rise in a variety of threats to our personal security. Knowing what these threats are and the risks they pose to us is of critical importance to understand in the digi… read more
-
October 2017
Hackers are attacking your WiFi - Here's how to protect yourself
The latest severe security vulnerability was made public yesterday. It’s crucial you’re all aware so you can mitigate against the threat. This flaw is in the WPA 2 protocol used in encrypted Wi-Fi networks. WPA 2- the encryption, the authentication, the protocol is what the majority of the populatio… read more