Featured Blogs

Supply Line Attacks

It doesn’t matter whether you are a consumer or a large corporation, you can’t hope to produce everything you need on a daily basis. You can’t produce enough food to feed yourself, and a company can’t build all the operating systems and applications to run its business. We all depend on suppliers of some form,… Continue Reading →

Latest Blogs

What I Use – Backups

We have blogged extensively on how and why you should backup your data. However, as we have all gone to a more remote working scenario due to current events, it is even more important to ensure your valuable data is backed up. During the pandemic we have seen an increase in cyber attacks, and in… Continue Reading →

Cyber Security Kill Chain

In our recent blog post “Multi-Phase Cyber Attacks” we described how cyber attacks are often not a single instance but part of a planned attack that can be sustained over several months, even years. An attack may only become apparent when the cyber attacker makes themselves known through some form of visible attack, a security… Continue Reading →

Book Review – I Woz

Steve Wozniak was the co-founder of Apple, but arguably one of the most notable engineers responsible for kickstarting the modern PC era. Steve Wozniac grew up in Silicon Valley (before it was called that). From an early age was interested in electronics and with the help of his father (an electronics engineer himself) built a… Continue Reading →

Book Review – Paul Allen Idea Man

Paul Allen was the co-founder of Microsoft with Bill Gates. This book is an autobiography of his life both before meeting Bill Gates, during the Microsoft days and after he left to follow other pursuits. He was born in 1953 and was two years older than Bill Gates. As this is written by Paul Allen… Continue Reading →

Risks Associated with Ghost/Inactive Accounts

Ghost accounts, depending on context, have various definitions. A Ghost Account can be: A social media account made solely to view other people’s content An inactive account that is still live but has either been forgotten about or is seldom used. Ghost Social Media Accounts People make ghost accounts on social media platforms for a… Continue Reading →

What I Use – My Home Office Setup v2.0

Back in March 2020 I posted a blog showing how I had set up my home office. Since then I have upgraded a few components and thought I would update this blog. In my previous post on my home office setup I commented that the headline picture showed a desktop that was way too tidy… Continue Reading →

Flash Player Now Disabled

Starting 16 January 2021, Flash Player is officially dead and any current installations will block the playing of any Flash content. Adobe ceased to support Adobe Flash Player as of 31 December 2020 and all download pages from their website have been taken down. Why is this happening? Adobe Flash Player is a legacy multi-media… Continue Reading →

WhatsApp Privacy Policy Changes

This week Facebook owned WhatsApp messenger will start to ask users to accept a new set of privacy policies that, depending on where you live, will enforce the sharing of data between WhatsApp and other Facebook companies. The previous policies (June 2020) offered an option to opt out of sharing data with Facebook companies. This… Continue Reading →

Loading…

Something went wrong. Please refresh the page and/or try again.



Selected Guidance Pages

Cyber Security

Cyber Attacks