Why the Dark Web Matters

Here’s Why the Dark Web Matters

Most of the civilised world is on the Internet every day – businesses large and small, governments, educators, adults, children and, unfortunately, criminals. The Internet may seem like a world without boundaries allowing us to find just about any kind of information, learn about other cultures, conduct business across the globe and even socialize with family and friends. Like many …

13 Cyber Security Truths To Live By img

13 Cyber Security Truths To Live By

#1 It’s Not A Technology Problem. It’s A People Problem When it comes to security, your organisation is very similar to a house. For protection, you have doors, locks, windows and fences. To detect threats, you have alarms, motion detectors, monitoring and crime watch. To respond to threats, you might have a dog, a gun, the help of local police …

Chrome to mark HTTP as ‘not secure’

Chrome to mark HTTP as ‘not secure’

Google Chrome currently marks HTTPS-encrypted sites with a green lock icon and “Secure” sign. And starting in July, Chrome will mark all HTTP sites as “not secure.” Google hopes this move will nudge users away from the unencrypted web. Read on to learn more about the forthcoming changes. For several years, Google has moved toward a more secure web by strongly advocating that …

Meltdown and Spectre fixes cause problems

Meltdown and Spectre fixes cause problems

It’s been three weeks since one of the worst IT security vulnerabilities in history was announced, and consumers are still receiving mixed messages about how to protect themselves. We usually encourage users to install software updates as often as possible, but when it comes to Meltdown and Spectre, that advice comes with an asterisk. Unsecured data storage Spectre and Meltdown …

A keylogger found in HP laptops

A keylogger found in HP laptops

Are you using an HP laptop? If so, your machine might have a keylogger pre-installed. This means every stroke you hit on your keyboard can be recorded and your passwords and personal details can be exposed. But don’t panic. We’re about to tell you how to remove it while educating you about this sneaky software and how to steer clear …

Identity and Access Management 101

Identity and Access Management 101

Whether it be cloud, mobile, or on-premises, every technology you use stores certain confidential data that are accessed by your employees. So how do you guarantee the safety of said data from cyber threats like identity theft, phishing attacks and more? IAM is the answer. What is IAM? Identity and access management is a system that secures, stores, and manages …

Is fileless malware a threat to you

Is fileless malware a threat to you?

Fileless malware is one of the recent topics in the truly horrifying cyber-security headlines that have been popping up over the last few months month. If you’ve been reading about “fileless” malware attacking banks and other big-name institutions around the world, we’re here to set the record straight: Your business isn’t in direct danger. But even if you’re not, staying …