IT Security Best Practices
Enhance your cybersecurity knowledge and practices with expert insights. Access articles on cyber hygiene, security policy guidelines, and effective incident response strategies to bolster your organization’s defenses.
Worst Passwords of 2018 and Password Best Practices Revealed
It’s the time of year when the poor password practices of users are highlighted. This month has seen the list of the worst passwords of 2018 published and a list of 2018’s worst password offenders. … Read more
Security Awareness Training Best Practices
Security awareness training best practices to help your organization tackle the weakest link in the security chain: Your employees. The Importance of Security Awareness Training It doesn’t matter how comprehensive your security defenses are and … Read more
Are Password Managers Safe?
Passwords should be complex and difficult to guess, but that makes them difficult to remember, so what about using password managers to get around that problem? Are password managers safe and secure? Are they better … Read more
The True Cost of a Ransomware Attack
The cost of a ransomware attack is far higher than the amount demanded by cybercriminals to unlock encrypted files. The final cost of a ransomware attack is likely to be many times the cost of … Read more
Preventing Ransomware Attacks
Hackers have embraced ransomware and have been more and more targeting businesses, yet many business leaders are unsure how to stop ransomware attacks. Due to this, the risk from ransomware is not being effectively managed, … Read more
Reducing the Data Footprint of your Company
The importance of reducing your company’s data footprint is paramount in today’s climate. If your company is subjected to an attack and hackers gain control of your servers, they will not be able to obtain … Read more
Are You Prepared for a Ransomware Attack?
It doesn’t matter which security report you read; one thing is clear. The ransomware problem is becoming worse and the threat greater than ever. While ransomware attacks in 2015 were few and far between, 2016 … Read more
Phishers Targeting Human Behavior
Hackers are using phishing to trick web users into handing over their sensitive data. Internet surfers are shown with a baited hook, which draws them into handing over login names, passwords, security keys and other … Read more
How are Hackers Punished?
The news is littered with reports of data breaches that have been experienced by companies and even governments. Many media reports detail how hackers have been able to obtain tens of thousands of confidential records, … Read more
Benefits of Teaching Hacking Techniques
This article explores the benefits of teaching hacking techniques. Why on earth would I want to do that you may ask? Isn’t that the same as telling someone how to rob a bank? Well, it … Read more
Five Common Business Network Security Myths
Unfortunately, common business network security myths have led many small to medium sized business owners to believe they are well protected against hackers, malicious insiders, and online criminals. They perceive their network to be secure, … Read more
Best Patch Management Practices
All operating systems have security issues Best patch management practices enable you keep on top of the security issues that are constantly being discovered. It seems as soon as one patch is released to deal … Read more