Journal
Should removable media be encrypted
We all use a variety of removable media in our daily lives, both for personal and professional use. We tend
Apple’s Lockdown Mode – Explained!
Apple’s Lockdown Mode – Explained! Apple has announced a new device protection feature known as “lockdown mode”. This mode severely
Understanding CERT-In’s new VPN Rules
Understanding CERT-In’s new VPN Rules CERT-In (The Indian Computer Emergency Response Team) announced a set of rules for VPN Providers
What is Cloud Security?
Introduction Cloud computing has been hailed as the future of business, with its ability to offer cheaper and more flexible
How Internal Audits can Help You Prevent Data Breaches?
Introduction A data breach is an event in which unauthorised individuals gain access to a company’s computers, networks or mobile
Intrusion Detection System [IDS] vs Intrusion Prevention System [IPS]
Introduction Intrusion Detection Systems [IDS] and Intrusion Prevention Systems [IPS] are two of the most important tools in any cybersecurity
Firewall – Are You Protected?
What is a firewall? A firewall is a device, software, or system that prevents unauthorised access to or from a
How to configure Privacy settings on Social Media Accounts
How to configure Privacy settings on Social Media Accounts Social media has changed the way we experience and engage with
Apple and Facebook Conned By Hackers
Tech Giants Apple and Facebook (Meta) were scammed by a Hacking Group named Lapsus$ leading to massive data leaks from
Information security – Protecting Security Data from Security People
Talking of modern security tools that scan millions of devices every day and gather intelligence on billions of events, these
What is Cybersecurity Leadership?
What is Cybersecurity Leadership? For organizations today, cyber risk is everywhere. Nevertheless, for every investment they have done to secure
How can you be Fluent in Cyber Risk?
How Can You Be Fluent in Cyber Risk? Do you know that 91% of businesses say their boards believe that