Tips List
T2022_14 What organizations should know about Cerber Ransomware (15th July 2022)
What is Cerber Ransomware? Cerber, also known as CRBR Encryptor, is a ransomware-type malware that infects computers and encrypts a variety of file t . . . Read more

Date Publish: Jul 15th 22
T2022_13 Antivirus Solutions (24th June 2022)
What is Antivirus software As the name implies, antivirus software is a program that detects and removes viruses. It detects or recognizes the virus . . . Read more

Date Publish: Jun 24th 22
T2022_12 Why should you Implement a SIEM solution on your network (20th June 2022)
What is A SIEM SIEM is an acronym that stands for security, information, and event management. SIEM technology combines log data, security alerts, an . . . Read more

Date Publish: Jun 20th 22
T2022_11 What you should know about Conti Ransomware (30th May 2022)
What is Conti Ransomware? Conti Ransomware is a malicious program belonging to the Conti Cyber Threat group that steals information from organizatio . . . Read more

Date Publish: May 30th 22
T2022_10 What are port scan attacks, and how can we avoid them? (25th May 2022)
What is port scanning?   A port scan is a technique for identifying which ports are open on a network. Port scanning is similar to… . . . Read more

Date Publish: May 25th 22
T2022_09 Firmware Security Vulnerabilities and How to Handle Them (18th May 2022)
What is Firmware Security Did you know that by inserting malware into your machine”s firmware, criminals can bypass your antivirus scans? Fir . . . Read more

Date Publish: May 19th 22
T2022_08 How Can Segmentation Help Secure Your Network (16th May 2022)
What Is Network Segmentation? Segmentation is used by businesses to increase monitoring, performance, pinpoint technical faults, and, most critically . . . Read more

Date Publish: May 16th 22
T2022_07 Identifying Rogue Access Points Can Help Protect Your Network (09th May 2022)
What is a Rogue Access Point? A rogue access point (AP) is a wireless access point (WAP) that has been placed on a secure network… . . . Read more

Date Publish: May 9th 22
T2022_06 Why cybersecurity sensitization/awareness sessions are important within the workplace (26th April 2
Endpoint, network, application, and cloud security are all essential for the operations of a business, but technology alone isn”t sufficient, an . . . Read more

Date Publish: Apr 26th 22
T2022_05 Hardening Your Network (22nd April 2022)
What is Hardening? Hardening is the process of eliminating a means of an attack by patching vulnerabilities, turning off non-essential services and co . . . Read more

Date Publish: Apr 22nd 22
T2022_04 Phishing kits constantly evolve to evade security software (29th March 2022)
What is Phishing? Phishing attacks occur when a person sends a fake message that appears to come from a trusted source. It is normally… . . . Read more

Date Publish: Mar 29th 22
T2022_03 Preventing and responding to Identity theft (7th March 2022)
What is Identity Theft? When someone uses your personal information to impersonate you or steal from you, this is known as identity theft. Even if&hel . . . Read more

Date Publish: Mar 7th 22

Pages: 1 - 2 - 3 - 4 - 5 - 6 - 7 - End