Advice

The avalanche of cyber security: How to identify the real threats

In this day and age, the wave of cyber security threats is deafening. Every week, businesses are facing millions of new malware variants and hacks, as well as having to deal with the deluge of media hype and marketing hysteria over the latest and newest threats, as well as the headlines of the most recent business to be breached. It’s no surprise, then, that it’s hard to keep up.We are now, more than ever, reliant on our technology. But with that reliance comes the need to ensure it’s safe and secure usage. Here are the key cyber security trends to watch out for this year.

The avalanche of cyber security: How to identify the real threats Read More »

Back to basics: simple tips for preventing cyber crime In your business

In this increasingly complex cyber world, there are, however, some basic tips to ensure you have the foundations set to avoid costly scams and sanitise your digital footprint.
We are now, more than ever, reliant on our technology. But with that reliance comes the need to ensure it’s safe and secure usage. Here are the key cyber security trends to watch out for this year.

Back to basics: simple tips for preventing cyber crime In your business Read More »

HAPPY SECURE NEW YEAR: HERE’S The cyber security trends to watch out for in 2021

It’s fair to say a lot changed in 2020. It was an unprecedented year, full of uncertainty, both economically and politically. 2021 has started much the same, with anytime, anywhere, remote working patterns remaining prevalent in the business world.

We are now, more than ever, reliant on our technology. But with that reliance comes the need to ensure it’s safe and secure usage. Here are the key cyber security trends to watch out for this year.

HAPPY SECURE NEW YEAR: HERE’S The cyber security trends to watch out for in 2021 Read More »

Misuse of Multi-Factor Authentication

When it comes to authentication, multi-factor authentication is the name of the game. We’ve spilled a lot of digital ink on the topic previously, and using a combination of some things that you know, are or have can help massively to secure your online accounts. However, mishandling multiple methods of authentication can actually make you more vulnerable than if you were just using the one method—you can end up with ‘below-one’-factor authentication, and nobody wants that.

Misuse of Multi-Factor Authentication Read More »

How to Handle SaaSS: Part 2

In the first part of this series, we talked about the ideas behind Software-as-a-Service (SaaS) offerings and the distinction between such products and what the Free Software Foundation calls Service-as-a-Software-Substitute (SaaSS) products—i.e., software that does not necessarily have to be hosted remotely, but is.

How to Handle SaaSS: Part 2 Read More »

RIP Passwords

Passwords are as naff as they are incredibly prevalent. The death of passwords has been predicted many times over the years, for example by some guy called Bill Gates way back in 2004. Clearly, predictions are a risky game, but recent developments suggest that we may, actually, honestly, finally be about to see the death of passwords—they shall certainly not be missed, if so. In this article, we will look at the newly-minted WebAuthn standard for Web authentication, and what it may mean for authentication.

RIP Passwords Read More »

Scroll to Top