Anatomy of a Phish

I expect a lot of you have received an email or text that claims you have won a prize and you need to click a link to claim it. This is often unexpected and you don't remember entering a competition to win the said prize. Maybe you have received an email from the Tax Authority... Continue Reading →

Managing and Securing Data

We all have gigabytes of business and personal data that is held in a variety of formats. Do you know what data you have, if it is secured correctly and where it all is? This subject is of massive importance to companies, but is equally important to individuals since you have a trove of data... Continue Reading →

A Review of 2019

What a difference 365 days makes. 2019 has been an eventful year for cyber security professionals with a number of new threats emerging as well as an escalation in ransomware and level of data breaches as well as all the normal threat vectors. IoT has also featured heavily in the cyber security landscape. But first... Continue Reading →

Myths of Cyber Security

I have found there is a general perception among people that they won't be hit by a cyber attack of some form and that cyber security is not something they need to worry about too much, after all you have installed an Internet Security product on your PC and you download apps from the official... Continue Reading →

Cyber Attacks 101 – A Pocket Guide

A Cyber attack is any attempt to expose, alter, disable, destroy, steal or gain unauthorized access to, or make unauthorized use of, a computer system. This can be anything from big servers to your smartphone and anything in between. There are various forms of Cyber Attack. The following list are just examples: Brute Force Attack/Dictionary... Continue Reading →

Create a website or blog at WordPress.com

Up ↑