IT Security Best Practices

Enhance your cybersecurity knowledge and practices with expert insights. Access articles on cyber hygiene, security policy guidelines, and effective incident response strategies to bolster your organization’s defenses.

Worst Passwords of 2018 and Password Best Practices Revealed

It’s the time of year when the poor password practices of users are highlighted. This month has seen the list of the worst passwords of 2018 published and a list of 2018’s worst password offenders. … Read more

Security Awareness Training Best Practices

Security awareness training best practices to help your organization tackle the weakest link in the security chain: Your employees. The Importance of Security Awareness Training It doesn’t matter how comprehensive your security defenses are and … Read more

Are Password Managers Safe?

Passwords should be complex and difficult to guess, but that makes them difficult to remember, so what about using password managers to get around that problem? Are password managers safe and secure? Are they better … Read more

The True Cost of a Ransomware Attack

The cost of a ransomware attack is far higher than the amount demanded by cybercriminals to unlock encrypted files. The final cost of a ransomware attack is likely to be many times the cost of … Read more

Preventing Ransomware Attacks

Hackers have embraced ransomware and have been  more and more targeting businesses, yet many business leaders are unsure how to stop ransomware attacks. Due to this, the risk from ransomware is not being effectively managed, … Read more

Reducing the Data Footprint of your Company

The importance of reducing your company’s data footprint is paramount in today’s climate. If your company is subjected to an attack and hackers gain control of your servers, they will not be able to obtain … Read more

Are You Prepared for a Ransomware Attack?

It doesn’t matter which security report you read; one thing is clear. The ransomware problem is becoming worse and the threat greater than ever. While ransomware attacks in 2015 were few and far between, 2016 … Read more

Phishers Targeting Human Behavior

Hackers are using phishing to trick web users into handing over their sensitive data. Internet surfers are shown with a baited hook, which draws them into handing over login names, passwords, security keys and other … Read more

How are Hackers Punished?

The news is littered with reports of data breaches that have been experienced by companies and even governments. Many media reports detail how hackers have been able to obtain tens of thousands of confidential records, … Read more

Benefits of Teaching Hacking Techniques

This article explores the benefits of teaching hacking techniques. Why on earth would I want to do that you may ask? Isn’t that the same as telling someone how to rob a bank? Well, it … Read more

Five Common Business Network Security Myths

Unfortunately, common business network security myths have led many small to medium sized business owners to believe they are well protected against hackers, malicious insiders, and online criminals. They perceive their network to be secure, … Read more

Best Patch Management Practices

All operating systems have security issues Best patch management practices enable you keep on top of the security issues that are constantly being discovered. It seems as soon as one patch is released to deal … Read more