What is Cybersecurity?

What is Cybersecurity? (Examples & Related IT Services)

Let’s start with the basics. “Cybersecurity refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Cybersecurity may also be referred to as information technology security.” Now that we’ve presented a formal definition from an industry leader in the data loss prevention (DLP) industry, I’d like to …

Breaches, Breaches Everywhere The Microsoft Exchange Breach Image

Breaches, Breaches Everywhere: The Microsoft Exchange Breach

This year, Microsoft announced that on-premises Microsoft Exchange servers were exposed to serious vulnerabilities via a breach by a Chinese state-sponsored hacking group. But why? We’re going to examine this and more for you in this article. Microsoft Exchange server breach: an overview Before we can start examining the effects, we need to explain the basic elements of what happened. Who’s behind …

13 Cyber Security Truths To Live By img

13 Cyber Security Truths To Live By

#1 It’s Not A Technology Problem. It’s A People Problem When it comes to security, your organisation is very similar to a house. For protection, you have doors, locks, windows and fences. To detect threats, you have alarms, motion detectors, monitoring and crime watch. To respond to threats, you might have a dog, a gun, the help of local police …

Keeping your email safe

Keeping your email safe

If you think your email is safe from hackers, think again. A lack of sufficient email security measures can result in data theft, unauthorised access to sensitive information, and malware attacks. Here are some tips to secure your email account from unwanted intruders and the many troubles that come with them. Use separate email accounts Most people use a single …

The dangers of distributed spam distraction

The dangers of distributed spam distraction

Users get around 200 emails in their inbox a day, including work messages, automated payment slips, and everyone’s least favorite email, spam. Spam messages are mostly harmless, but when you get more than 10,000 of them flooding your inbox, you’re probably the victim of a special type of spam attack. Understanding DSD Distributed Spam Distraction (DSD) is designed to inundate …

Phishers use encrypted sites to scam

Just when you thought cyber criminals couldn’t get smarter, along comes a new scamming technique. Previously used for safeguarding browsing activity, encryption tools are now used by hackers in carrying out phishing scams. This means some fraudulent sites may have HTTPS on their address, giving users a false sense of security. How hackers use encryption to carry out phishing scams …

Outlook on Mac and Windows gets redesigned

Outlook on Mac and Windows gets redesigned

Microsoft is redesigning Outlook for Mac and Windows to reduce clutter and improve user experience. The design changes will be patterned after the iOS version of the app, which is much easier to use and more modern-looking than its desktop counterpart. If you use Outlook on a desktop, check out these new changes. How Outlook will be simplified The most …

Microsoft Word bug What you need to know

Microsoft Word bug: What you need to know

Software developers and hackers are in a constant game of cat and mouse. When cybercriminals find new security bugs to exploit, tech companies have to quickly release a solution that secures those vulnerabilities. Earlier this year, Microsoft released a patch to eliminate a Word exploit designed to steal user information. If you’re an avid Microsoft Word user, here’s what you …

What exactly is preventive cyber-security

What exactly is preventive cyber-security?

There has been a movement among technology providers to promise “proactive” cyber security consulting. Small- and medium-sized businesses love the idea of preventing cyber-attacks and data breaches before they happen, and service providers would much rather brainstorm safeguards than troubleshoot time-sensitive downtime events. But it’s not always clear what proactive cyber-security means, so let’s take a minute to go over it to better understand …