Enterprises must comply with Information Security Policies
CYBER DEFENCE | CYBER SECURITY

Enterprises must comply with Information Security Policies

Why information security policies? As so many organizations (SMEs and Large enterprises) adopt technology in their daily operations, shifting from data-driven decision-making to cloud adoption, mobility, and the explosion in Internet-of-Things (IoT), it has been experienced that the adoption goes beyond just deploying new solutions but also call for other new disciplines among which include;…

Enhance your cyber hygiene in your virtual education/online presence
CYBER DEFENCE | CYBER SECURITY

Enhance your cyber hygiene in your virtual education/online presence

What’s your worst cyber nightmare? What is your plan to prevent this and should something happen, mitigate it? Have you heard of something called cyber hygiene? Surely, brushing your teeth and taking showers isn’t something traditionally associated with technology — yet the term is a useful metaphor for needing to make smart decisions about your…

Mobile Gadgets And Work Computers Are Left Open To Attack
COMPUTER SECURITY | MOBILE SECURITY

Mobile Gadgets And Work Computers Are Left Open To Attack

As of the fourth industrial revolution today, information is the most crucial and important asset to any organization. It is, for this reason, that information to any organization should be protected wherever it resides to protect any business against reputational risks and loss of money. Businesses are trying hard to keep their networks and devices…

The value of Social Engineering pen-testing
Blog | CYBER DEFENCE | CYBER SECURITY

The value of Social Engineering pen-testing

Penetration testing is done in different ways, apart from other penetration testing processes, Social Engineering is one of the fundamental techniques and methodologies that is so important, which all organizations should embrace to assess their level of resilience towards information security.  As human beings continue to be the weakest link in the security chain, organizations…

Patient’s platforms regarded as target
CYBER DEFENCE | CYBER SECURITY

Patient’s platforms regarded as target

How to protect from the Cyber Risks created by technology providers with the use of mobile and patient portals. It has been noticed from various studies like Kantar (on 20th March 2020), about best practice cybersecurity methods for Remote care which have shown that privacy and security concerns are hindering patients’ willingness to use health…

Risking your Browsing History/activity to Public WiFi owners..
CYBER DEFENCE | CYBER SECURITY

Risking your Browsing History/activity to Public WiFi owners..

Public Wi-Fi is found most popular in public places like airports, coffee shops, malls, restaurants, and hotels. It allows everyone that is short of their mobile data or enthusiastic about wireless connectivity (like it is experienced in most internet users), to access the Internet freely in such places. These owned networks (Hotspots) are so widespread…