Using Cloud Services Safely

Whether or not you realise it, we all use the cloud for something in our daily lives. In this blog I want to explain in simple terms what 'The Cloud' is and how you can apply some simple safeguards to secure your use of it. What is the Cloud - a History Lesson? Lets go... Continue Reading →

Combating Social Engineering

Social Engineering is a form of cyber attack where the physiological manipulation of people to trick them into divulging confidential information that can be used to hack into websites and other computing resources. There are various forms of social engineering: Baiting Impersonating PharmingPhishingSmishingSpear FishingTailgatingVishing Water HolingWebsite CloningWhaling. Lets take a deeper look at these. Baiting... Continue Reading →

Electronic Payments

When was the last time you paid for a transaction in cash? We all use electronic forms of payment these days, and in some cases people just don't carry cash anymore. So, what are the various forms of electronic payments we use? The following are the usual examples: Credit/Debit Cards (in person or online)Direct Debit... Continue Reading →

Securing your Smartphone/Mobile Device

An interesting factoid came to be earlier this week via a tweet by Twitter user @Tarah about the top 20 most commonly used 4 digit Mobile PINs. I also found a similar list on Gizmodo that also gave the percentages. These are as follows: 1234 1111 0000 1212 7777 1004 2000 4444 2222 6969 9999... Continue Reading →

Create a website or blog at WordPress.com

Up ↑