you can check the strength of your passwords using tools like this http://www.passwordmeter.com/
What is spyware
Spyware is a type of malicious software that is spread around on the internet. The term spyware is used to describe software that carries out certain behaviours or operations without obtaining user consent. Such behaviours include but are not limited to: advertising, personal information gathering, and even changing computer settings and configurations. Spyware can be […]
What is data exfiltration?
Data exfiltration is formally defined as the unauthorised transfer of sensitive information from a target’s system or network by an attacker to another location. Data is always moving around in network this makes it very hard to detect an exfiltration attack which makes it all the more serious and devastating. Such a transfer of data […]
use 2 factor authentication to be safe when accessing your e-mails or social media accounts on untrusted or public computers
As computer processing power increases the security of traditional passwords decreases due to vulnerability to what is known as dictionary attacks or brute force attacks. These are attacks where an attacker computer puts together a set of passwords and tries them out until your account is compromised. To face this threat the concept of password […]
Avoid entering sensitive data like your credit card numbers or any other financial or sensitive information into any public computer.
Always log out of websites by clicking “log out” on the site. It’s not enough to simply close the browser window or go to another website.
Password Manager Apps
Today you can’t live in the business world without spending some time online. Your online presence is secured by the passwords that secure your many accounts. The volume of the tragedy that can occur once any of your passwords is compromised needs no description. It is also a well established fact that you simply cannot have […]
6 IT Security Tips for Your Workplace
Today’s business are heavily reliant on information technology. Your workstation or PC has become an asset in addition to it being the tool through which your perform. Due to its importance it is very important for you to consider these tips on how to secure your workstation: Gear Up: It is very important from a […]
What is a Phishing Attack?
A phishing attack is basically an attack that can be used by a hacker to obtain information about you simply by asking for it. This is a rather simplified definition. What actually happens is that the attacker typically throws bait and waits for you to catch it. If you do, you are hacked. You can […]