What you ought to know about your security when using a VPN

What you ought to know about your security when using a VPN

Posted on Leave a commentPosted in Business, Cybersecurity

A Virtual Private Network (VPN) is fast becoming the preferred method of secure connectivity between sites, for example, Head Office and a Branch Office. In essence a VPN, sometimes called a tunnel, is a private network running over the Internet.  It keeps your web activity secure and private while operating over the Internet.  It provides […]

Six Effective Ways to Prevent Data Breaches

Six Effective Ways to Prevent Data Breaches

Posted on Leave a commentPosted in Business, Cybersecurity, Tips

Internet and On-Line Security is something that every business needs to take seriously.  The media often have lurid tales of thefts of financial data, malicious attacks on prominent websites, and some have even been hijacked and their content changed. It`s not just the large corporations anymore.  As they have tightened up their defences and made […]

Why User Training is the first line of defence in cyber attacks

Why User Training is the first line of defence in cyber attacks

Posted on Leave a commentPosted in Business, Cybersecurity, Insights

It’s not a question of if you will suffer a cyber attack, it’s more a question of when. Experts say that the only fully secure systems are those that have not been hit yet.  You may have made all the preparations, implemented malware protection software and firewall appliances, configured your network securely, and carried out […]

Why SSL Certificates are essential in your business website

Why SSL Certificates are essential in your business website

Posted on Leave a commentPosted in Business, Cybersecurity, Insights

There has been a massive increase in the volume and sophistication of malware and malware attacks detected recently.  Two website security scenarios that give Heads of IT sleepless nights are hijacking of their business website and data theft.  Users are particularly concerned about fake websites, particularly banking and other finance websites that require personal banking […]

Think like a cyber criminal: Understanding strategies and learning to how to defend

Think like a cyber criminal: Understanding strategies and learning to how to defend

Posted on Leave a commentPosted in Business, Cybersecurity, Insights, Tips

The increasing sophistication of malware attacks on any commercial site or personal computer indicates a corresponding increase in the scale and sophistication of the preventative and recovery measures needed. A large organisation might keep its cyber security function in-house and develop its own strategies.  Smaller organisations are increasingly turning to Internet Security Services to assist […]

Bring Your Own Device: How to balance convenience and security

Bring Your Own Device: How to balance convenience and security

Posted on Leave a commentPosted in Business, Cybersecurity, Insights

The emergence of smartphones and tablets as mobile devices has been a significant change in the ICT landscape in recent times.  Allied with the increasing prevalence of private and public WiFi networks, Bring Your Own Device (“BYOD“), has proved to be both a blessing and a curse for ICT departments.  A blessing in that BYOD […]

How CMS Systems are being used by hackers to stage a cybercrime

How CMS Systems are being used by hackers to stage a cybercrime

Posted on Leave a commentPosted in Cybersecurity, Insights

The development of Content Management Systems (“CMS”) has enabled the most inexperienced of new users to develop and publish their own blog or website.  What are CMS Systems and how are CMS Systems being used by hackers to stage a cybercrime? The WikiPedia definition of a CMS is “a computer application that supports the creation […]

How to protect your company from a Ransomware attack?

How to protect your company from a Ransomware attack?

Posted on Leave a commentPosted in Cybersecurity, Insights, Tips

Every computer installation is vulnerable to attack by malware. It used to simply e-mail borne viruses, but over time malware has acquired a degree of sophistication matched only by the antivirus and malware protection systems developed to thwart it. We now see rootkits, spambots, and latterly ransomware. An entire sub-industry has grown up around cybersecurity. […]