Journal
Benefits of Iso 27001 and How it can help your business?
The information security procedures that are in place within your Organization are designed to protect the Confidentiality, Integrity and Availability
Facebook 2FA Phish Scam
Facebook 2FA Phish Scam Reported by Sophos Recently, Social Media platforms are being widely used for carrying out various types
What Is Principle of Least Privilege & Why Do You Need It?
What Is the Principle of Least Privilege & Why Do You Need It? What Is the Principle of Least Privilege?
7 Really easy steps to prevent ransomware
What is ransomware? A ransomware is a type of malware that restricts access to the infected device, or threatens to
Should removable media be encrypted
We all use a variety of removable media in our daily lives, both for personal and professional use. We tend
Apple’s Lockdown Mode – Explained!
Apple’s Lockdown Mode – Explained! Apple has announced a new device protection feature known as “lockdown mode”. This mode severely
Understanding CERT-In’s new VPN Rules
Understanding CERT-In’s new VPN Rules CERT-In (The Indian Computer Emergency Response Team) announced a set of rules for VPN Providers
What is Cloud Security?
Introduction Cloud computing has been hailed as the future of business, with its ability to offer cheaper and more flexible
How Internal Audits can Help You Prevent Data Breaches?
Introduction A data breach is an event in which unauthorised individuals gain access to a company’s computers, networks or mobile
Intrusion Detection System [IDS] vs Intrusion Prevention System [IPS]
Introduction Intrusion Detection Systems [IDS] and Intrusion Prevention Systems [IPS] are two of the most important tools in any cybersecurity
Firewall – Are You Protected?
What is a firewall? A firewall is a device, software, or system that prevents unauthorised access to or from a
How to configure Privacy settings on Social Media Accounts
How to configure Privacy settings on Social Media Accounts Social media has changed the way we experience and engage with