- Week in Review
The Guyana National Computer Incident Response Team (GNCIRT) seeks to provide technical assistance to public agencies to prevent and respond effectively to information security incidents of national importance.
Browser Updates
Get Safe Online recommends that for optimum protection against fraud when using the internet, you always run the latest version of your chosen browser that…
Software Decommissioning
It is important that you carry out regular reviews or audits of application software on all computers and information systems, and ensure that redundant software…
Safe Disposal
Smartphones and tablets that you no longer need should be disposed of with great care. The data on your device can easily be accessed whether…
Google Chrome Security A
Google Chrome has published a security advisory to address vulnerabilities affecting the following products on October 22, 2024. It is recommended that you take the necessary…
HPE Security Advisory (2
HPE has published a security advisory to address vulnerabilities affecting the following products between October 18 and 20, 2024. It is recommended that you take…
Dell Security Advisory (
Dell has published a security advisory to address vulnerabilities affecting the following products between October 14 and 20, 2024. It is recommended that you take…
Malicious WordPress Plug
Description WordPress websites are increasingly being targeted by threat actors who install malicious plugins that push information-stealing malware to unsuspecting visitors. These plugins display fake…
D-Link DIR-846W Routers:
Description D-Link has issued a warning regarding four Remote Code Execution (RCE) vulnerabilities affecting all hardware and firmware versions of its DIR-846W router. The company…
New Threat Targeting Win
Description Cicada3301 is a new ransomware group that targets Windows and Linux systems, especially VMware ESXi environments. They use double-extortion tactics, stealing data and encrypting…
Why should businesses ve
Creating an effective business social media presence begins with social media verification. Verifying your accounts not only makes your official social channels more accessible but…
Weak Passwords from Keyb
When setting up password policies for your organization, it’s crucial to address the common yet often overlooked risk of keyboard walk patterns. These are passwords…
Strengthen Your Data Sec
Before integrating generative AI copilots into your organization, ensure that your data security foundations are robust. Start by right-sizing user permissions to prevent overly broad…