location security

Location Security

Cards and contactless payments leave an extremely detailed digital footprint that can be used to track individuals while travelling. However, do we think about the implications of our social media use during our trips from a safety perspective (location security)? The woes of various celebrities have been well publicized in the past. Sporting stars whose
-> Continue reading Location Security

3 Cyber Security Threats You Could Face

In recent years there’s been increase in the frequency and severity of individual people and groups attempting to expose flaws in security systems. There are a number of reasons why people attempt do this such as: access to private information, stealing accounts, or even to demand money from the victim of the breach. Below are
-> Continue reading 3 Cyber Security Threats You Could Face

Laptop with error warning sign on cartoon graphic

Data Breach At Equifax hits 143 Million

Around 143 million customers of credit report giant Equifax may be at risk of having their information accessed through a cyber security breach. Equifax have said that the cyber-criminals accessed data such as Social Security numbers, birth dates and addresses during the incident. This cyber security breach also had an effect on Equifax customers based
-> Continue reading Data Breach At Equifax hits 143 Million

security

Keeping SME’s Secure And Safe

If recent news and headlines are anything to go by, there is still a long way to go in terms of cyber security. On a global scale, there is frequently news of the vulnerability of our digital world and how it has most recently been compromised. National statistics indicate that nearly two thirds of individuals
-> Continue reading Keeping SME’s Secure And Safe

security physical key on keyboard

Security Tips

Hackers are innovating the way they obtain and use personal data and user credentials in their attacks.  Since 2016 hacking has gone mainstream – households are getting attacked and businesses too.  There are numerous ways that hackers illegally obtain personal data.  This article explains a few basic checks you can perform before proceeding with an
-> Continue reading Security Tips

Network cables

Security Of Your Networked Devices

Last week I talked about educating your workforce with cyber security skills. This week I draw your attention to ensuring security of your networked devices, services & protocols. Addressing these threats requires skill and expertise in security in a ‘real-world’ capacity, employing the tools, methods & mind set which cyber-criminals themselves use to steal data
-> Continue reading Security Of Your Networked Devices