Tips List
T2022_09 Firmware Security Vulnerabilities and How to Handle Them (18th May 2022)
What is Firmware Security Did you know that by inserting malware into your machine”s firmware, criminals can bypass your antivirus scans? Fir . . . Read more

Date Publish: May 19th 22
T2022_08 How Can Segmentation Help Secure Your Network (16th May 2022)
What Is Network Segmentation? Segmentation is used by businesses to increase monitoring, performance, pinpoint technical faults, and, most critically . . . Read more

Date Publish: May 16th 22
T2022_07 Identifying Rogue Access Points Can Help Protect Your Network (09th May 2022)
What is a Rogue Access Point? A rogue access point (AP) is a wireless access point (WAP) that has been placed on a secure network… . . . Read more

Date Publish: May 9th 22
T2022_06 Why cybersecurity sensitization/awareness sessions are important within the workplace (26th April 2
Endpoint, network, application, and cloud security are all essential for the operations of a business, but technology alone isn”t sufficient, an . . . Read more

Date Publish: Apr 26th 22
T2022_05 Hardening Your Network (22nd April 2022)
What is Hardening? Hardening is the process of eliminating a means of an attack by patching vulnerabilities, turning off non-essential services and co . . . Read more

Date Publish: Apr 22nd 22
T2022_04 Phishing kits constantly evolve to evade security software (29th March 2022)
What is Phishing? Phishing attacks occur when a person sends a fake message that appears to come from a trusted source. It is normally… . . . Read more

Date Publish: Mar 29th 22
T2022_03 Preventing and responding to Identity theft (7th March 2022)
What is Identity Theft? When someone uses your personal information to impersonate you or steal from you, this is known as identity theft. Even if&hel . . . Read more

Date Publish: Mar 7th 22
T2022_02 Avoid being Scammed This Valentines Day (14th February 2022)
With Valentine”s Day approaching, you can bet that con artists will try to prey on lovebirds across the world. Here is how to prevent a… . . . Read more

Date Publish: Feb 14th 22
T2022_01 Peer-to-Peer Botnet FitzFrog is Back (11th February 2022)
What is FitzFrog? FritzFrog is a sophisticated modular, multi-threaded and file-less P2P (peer-to-peer) botnet that has been actively infiltrating SSH . . . Read more

Date Publish: Feb 11th 22
T2021_22 Tip to protect against Log4j Exploitation (21st December 2021)
What is the Apache Log4j Vulnerability? A series of vulnerabilities were recently discovered in the popular Java-based logging library Log4j which res . . . Read more

Date Publish: Dec 21st 21
T2021_21 Risks of File Sharing (15th December 2021)
What is File Sharing? File sharing is the practice of using technology that allows internet users to share files that are on their individual devices. . . . Read more

Date Publish: Dec 15th 21
T2021_20 Understanding Software Patches and Updates (30th November 2021)
What are Software Patches and Updates? A software patch commonly known as a fix, is a small piece of software that addresses security vulnerabilities . . . Read more

Date Publish: Nov 30th 21

Pages: 1 - 2 - 3 - 4 - 5 - 6 - 7 - End