- Week in Review
The Guyana National Computer Incident Response Team (GNCIRT) seeks to provide technical assistance to public agencies to prevent and respond effectively to information security incidents of national importance.


Browser Updates
Get Safe Online recommends that for optimum protection against fraud when using the internet, you always run the latest version of your chosen browser that…

Software Decommissioning
It is important that you carry out regular reviews or audits of application software on all computers and information systems, and ensure that redundant software…

Safe Disposal
Smartphones and tablets that you no longer need should be disposed of with great care. The data on your device can easily be accessed whether…

Jenkins Security Advisor
Jenkins has published a security advisory to address vulnerabilities affecting the following products on April 2, 2025. It is recommended that you take the necessary…

Cisco Security Advisory
Cisco has published a security advisory to address vulnerabilities affecting the following products on April 2, 2025. It is recommended that you take the necessary…

VMware Security Advisory
VMware has published a security advisory to address vulnerabilities affecting the following products on April 1, 2025. It is recommended that you take the necessary…

Cisco CSLU Backdoor Admi
Description Cisco has issued a critical security warning regarding a built-in backdoor administrative account found in the Cisco Smart Licensing Utility (CSLU). The vulnerability, identified…

The Impact of SSL Miscon
Description SSL (Secure Sockets Layer) is essential for encrypting data transmitted between clients and servers, ensuring confidentiality and authentication. However, SSL misconfigurations can introduce critical…

How Microsoft 365 Backup
Description As organizations increasingly migrate their operations to the cloud, ensuring robust security measures in cloud environments has become crucial. Microsoft 365 (M365) remains a…

The Importance of Login
Login banners are an essential cybersecurity measure that provides a warning and legal notice to users attempting to access a system. They serve multiple purposes,…

Mitigating Shadow IT Ris
Unauthorized applications or services within an organization, known as shadow IT, can introduce security risks. Ensure employees only use company-approved software and continuously monitor for…

Keep Your Website Secure
A strong password is your first line of defense against cyber threats, helping prevent unauthorized access to your accounts and sensitive data. Ensure your passwords…