You guessed it. I’m talking about those mobile phones that everyone has in their pockets. Continue reading
There’s been a lot in the news over the last few weeks about ransomware attacks. As the media can give people the wrong impression let me clear up some things for you. Continue reading
Hollywood films would have us believe that cyberattacks are elaborately planned and use expensive, sophisticated tools developed by hackers and geeks is sophisticated labs. But in real life, most hacks are nothing like that as the first steps cybercriminals take are to simply fool a human to gain access. Continue reading
You may think it is a bit of fun to type in your answers to the quiz, which asks silly questions such as your nickname and first model of car? You may think it is some plain old fun, but many of these social media questionnaires are set up by hackers to steal your identity. Continue reading
If you get hit with ransomware there will be a number of indications, including:
This blog article details a number of steps you can take instead of paying the ransom straight away. Continue reading
Back in the day, the advice was to change your passwords often.
That is now bad advice. Continue reading
It is a sad but true fact that your employees are your number one cyber-security threat.
They are often the main gateway through which hackers gain their way into your business. All it takes, is one staff member clicking on one wrong link in an email, for cyber-criminals to get in. Continue reading
Proprietary information makes your business special, whether you’re a startup with a unique take on an area or a food manufacturer with a secret sauce. Regardless of industry, businesses gain a competitive advantage from distinct practices or unique data. The last thing you want is someone with ill intent getting their hands on your differentiators. Here are some tips on how to protect your proprietary information. Continue reading
Reports of cybersecurity attacks on companies and government agencies are unfortunately too common these days. Millions of access credentials are breached and millions of dollars are lost to ransomware attack everyday. You may think you are protected, but even a single undetected misconfiguration could mean trouble and open to attack. Continue reading
News of a big name company suffering a data breach is all too common these days. But what about the customers of these companies? Have all their customers’ details been compromised? Continue reading