Category Archives: Security Awareness
How To Protect Your Healthcare Institutions Against Cyber Attacks
Healthcare has become a top priority due to the pandemic and with so many wheels turning to keep up with demands several things fall through the cracks and one of them being cyber security. Healthcare cyber attack breaches and leaks not only hurt the institutions financially but also hurt its patients for the rest of…
The Strategy Behind Ransomware Attacks
Everyone Hates Ransomware Attacks and we should learn their strategy. Ransomware is a type of malware that is installed onto computers through malicious emails. The ransomware encrypts the computers data and then requires the victims to purchase a decryption key. Once the data is encrypted the hackers will demand a ransom, which can set you…
Phishing Facts Every Business Should Know.
Have you asked yourself, are you doing enough to protect your business from phishing attacks? if your second guessing yourself you are most likely have been or going to be a victim of a phishing attack. Read these shocking phishing facts you may or may not know–and how these facts may apply to your own…
The Risks Of Sharing Passwords At Work
Did you know that 81% of Data Breaches happen due to poor password practices and one of are due to human errors like password sharing which can lead to massive data breaches. I’m sure your open minded just like me and when you read these statics it will provide the criticality of password security in…
Digital Weapons You Must Know About!
What is this Digital Weapon? This type of Malicious Software Weapon is called or for short Malware. This type of software is designed intentionally to hurt and infect your network and computers and their are many type in the wild. Types of Digital Weapon Threats There are many types of malware however the weapons mostly…
Cyber-Response Ethical Guidelines is a must read.
Now this was an interesting read from the website ethicsFIRST. They guide you through 12 ethical duties which are listed and explained. Of course some of it seems to be a little on the nose and why did you not ethically choose this path to begin with? Regardless these steps are great for people that…
Achieving Security with IoT (Internet of Things)
Our lives have been taken over with many many WiFi enabled capable devices. The internet of things (IoT) has quite a flaw which is security. Many vendors lax on providing security updates to their software that are used in smartphones, tablets, PC’s , Game Consoles , TV’s , your Fridge and many other devices. This…
Why You Need Security Education and Awareness Training.
One of the greatest threats to information security could actually come from within your company or organization. Inside ‘attacks’ have been noted to be some of the most dangerous. It is not always disgruntled workers who are a threat. Often, it is the non-malicious, uninformed employees. 1. It is the first line of defense against…
Maintaining Security with Internet of Things
Our lives have been taken over with many many WiFi enabled capable devices. The internet of things (IoT) has quite a flaw which is security. Many vendors lax on providing security updates to their software that are used in smartphones, tablets, PC’s , Game Consoles , TV’s , your Fridge and many other devices. This…