Journal

What is tailgating in cyber security?
What is tailgating in cyber security? What is tailgating? Tailgating is a type of cyber attack where an unauthorised person

What is whaling in cyber security?
Introduction Whaling is a form of email phishing that targets high-level executive employees. The goal of this attack isn’t to

Medibank Hack: Cyber criminals steal data through Ransomware
A ransomware group posted sensitive Personal Data of the Customers of one of Australia’s largest health insurers, Medibank, on the

Managed Cyber Security Service: Secrets You Should Know
Managed Cyber Security Service: Secrets You Should Know Introduction Most people are aware of the importance of cyber security. However,

History of Computer Virus
What is a computer virus? A computer virus is a malicious program that can infect computers, devices and systems. The

SOC 2 Compliance Checklist: All You Need To Know
Introduction SOC 2 Compliance is a set of common standards for Service Organisations that guide the way they handle customer

What is HIPAA Violation? Examples and how to avoid them
Introduction Health Insurance Portability and Accountability Act [HIPAA] is a set of rules and regulations that govern how medical information

HIPAA Compliance Checklist: Essential Things You Must Know It
HIPAA Compliance Checklist: A 10-point checklist to make sure your Organisation achieves HIPAA Complaince! Before we get into the checklist,

Security Compliance: All You Need To Know About It and Importance
What is security Compliance? Information security has become a major concern for Organizations, especially in the current digital era. The

ISO 27001 Controls: What is it and why it is necessary?
What is ISO 27001? ISO 27001 is a popular certification that can help Organizations manage their information security risks better.

What Is Security Assessment? How Does It Work?
Introduction If you’re a business owner, you probably know how important it is to keep your company safe from cyberattacks.

ISO 27001 Checklist: 9-step Implementation Guide
ISO 27001 Checklist: 9-step Implementation Guide Introduction Implementing ISO 27001 can be a difficult process, but it’s also vitally important