Protecting Your Customer Data – The Basics

Protecting Your Customer Data – The Basics

As cyber-attacks continue to make headlines and unlawful access to customer data rises, one might think that it must be a daunting task to minimize these risks and exposure. However, like with any threat, it is important to get the basics right. Here are some simple...
Firewalls – Purchase and Deploy – But is it enough?

Firewalls – Purchase and Deploy – But is it enough?

Firewalls are a well-known security essential and recently, business owners have been catching on as big fans. But did you know that a firewall alone is not enough to keep your business safe? Imagine the scenario of building a fence around your house to keep out...
Meltdown and Spectre – What is it in simple terms!

Meltdown and Spectre – What is it in simple terms!

The recent discoveries of new vulnerabilities on the computer chips that power most of our computers have left practitioners scrambling to come up with solutions. Unfortunately, as these vulnerabilities occur at the chip (hardware) level, these are more difficult to...
The KRACK WiFi Vulnerability: How to stay safe

The KRACK WiFi Vulnerability: How to stay safe

An open source report has confirmed a vulnerability in the WPA2 protocol, which is used to secure most modern WiFi networks. This vulnerability has been named “Key Reinstallation Attacks” or KRACK . Without going into the technical details as how the...
Cyber Security – Ways to Travel Safe for Business

Cyber Security – Ways to Travel Safe for Business

With current IT advancements, working from anywhere is now as simple as accessing the internet on your device. Owners, managers and employees are embracing the flexibility of working while traveling, making it the new global norm. While you were in the comforts of the...
Quick Security Tips To Help Keep Your Business Safe

Quick Security Tips To Help Keep Your Business Safe

Every employee shares one inescapable flaw that is putting your business at risk – They are human. 59% of data breaches can be traced back to something an employee did (or did not do), which invited a cyber-attack. To lock hackers out, build security awareness...