Have you ever wondered if your Twitter account has been hacked and who may have gained access to it?While a bit late to the party, after Google and Facebook, Twitter now lets you know any and all devices that have logged into your account. Twitter has also rolled out a new security feature for its
At the start of July Google released the Chrome 68 update and since then they have been marking all HTTP sites as ‘not secure’.Google has been giving gentle nudges to users for a number of years to encourage them encrypt their sites with HTTPS starting in 2015 when they began to down-rank unencrypted sites.Site
The greatest threat to your organisation is sitting in the inboxes of your employees. Email is still the number one threat vector and a major weak link in your IT security. The truth of the matter is that many of us have become complacent and just want to get through the many emails that
When you hear the phrase "Disaster Recover" your are probably thinking of inhospitable environments or locations that suffer from extreme weather events. Did you know that most “Disaster” events occur from system failures, human error or cyber-attack? Your data is your most valuable assets and the loss of data can have a detrimental effect on
Essential Cybersecurity Toolkit
Making the Case for Cloud to Cloud Backup
What is Meltdown and Spectre We’re only at the start of 2018 and already we have two security risks to contend with. Meltdown and Spectre are two security vulnerabilities discovered in modern microprocessor chips that may allow attackers to exploit the chips common features and puts your personal data, including passwords, at risk. People
STOP!! - Do you know where that USB stick or memory card came from? Was it delivered in the post? Did you simply find it on the ground and thought “What better way to establish who owns it then to plug it into my computer and see it the owner’s details are on it”.