Ransomware: Don't let your business be defrauded too

The cyber threat is very real; a breach in cyber security resulting in the theft, loss or corruption of data, occurs every second in businesses and homes around the globe. 

Read More

Watch out for Online Identity Theft

In this day and age, most of us spend our time online. Whether it’s on social media, online shopping or informative pages – you’ll find it hard to disagree with us that crucial information related to ...

Read More

Hackers strike again with a new Ransomware plot.

Ransomware gangs have signalled to publish the data stolen from victims who refuse to pay the ransom. Cybercriminals behind the Maze ransomware have erected a website on the public internet that ident...

Read More

Cybersecurity in 2019: Expectation Vs Reality

In 2019, 32 percent of breaches and 78 percent of cyber-espionage incidents were carried out through phishing attacks. Automation gained grounds in security operations across many organisations this y...

Read More

The Most Common Passwords Found From Breaches in 2019

Researchers analysed data leaked in various data breaches to bring this study forward. Passwords ‘12345,’ ‘123456,’ and ‘123456789’ were the most common passwords, followed by ‘test1’ and, of course t...

Read More

The Tale of Ali Baba Is Why We All Need Multi-Factor Authentication!

One day, Ali Baba, a poor woodcutter is out hard at work chopping wood in the forest, when he is suddenly distracted. Paying closer attention, he overhears a band of thieves gaining access to a magica...

Read More

5 Traits to Look for in an Effective CIO

There are times when you do not have the technology expertise required within your company to plan a project or to solve a problem that feels like it is crippling one or more business operations. Ther...

Read More