Cybersecurity Month

Cybersecurity Month

October is the 18th-ever Cybersecurity Awareness month. Let’s look at the history of this initiative and look at some of the best online safety practices. This month began similar to the initiative of checking your smoke alarm batteries twice a year. Instead, we...
Create Secure Accounts

Create Secure Accounts

Learn how to create truly secure accounts. The first thing everyone should do is have Google, Microsoft and Authy authenticator apps. This can be helpful as many websites will require them when you are setting up 2-FA. Therefore, it will save you time to have them...
2-Factor Authentication

2-Factor Authentication

2-Factor Authentication reduces risk by 99%. The biggest cause of attacks are from a business being hacked and your data leaked online. Consequently, your email address password has likely already been leaked, find out here. Therefore, it is strongly advised that...
Cyber Insurance

Cyber Insurance

What you need to know about cyber insurance. Firstly, it helps protect against losses related to computer or network-based incidents. Because of this, cyber insurance is becoming more common for businesses recently. Therefore, we will discuss what you should look for...
Phishing 101

Phishing 101

Learn how to spot any type of phishing attack. A phishing attack is social engineering, an attacker tries to steal sensitive information such as login credentials or credit cards. These attacks are incredibly common. Always check exactly what the email address says,...
Mixed OS Environments

Mixed OS Environments

How best to manage mixed OS environments. OS stands for operating system, which is the interface developed by the manufacturer. For example, most people know Microsoft developed Windows, Apple developed Mac OS and then there’s also the free OS, Linux.  ...