2022's best place for Cybersecurity Insights and Advice for Everyone

Find What You're Looking For

The #1 Cyber Threat Small Businesses are Facing

The #1 Cyber Threat Small Businesses are Facing

Phishing attacks are the most widespread and most damaging threat to small businesses, accounting for 90% of all cyber security breaches.

Do You need to Conduct a Cyber Security Risk Assessment

Do You need to Conduct a Cyber Security Risk Assessment

Small businesses experience cyber security risks in varying forms and sophistication every day. Being complacent about the risks and ignoring the importance of a cybersecurity risk assessment can damage the health of their businesses. 

What is a zero-day threat?

What is a zero-day threat?

A zero day threat is a security flaw known or unknown to the software vendor which hasn't had a patch made to fix the vulnerability.

What is HTTPS?

What is HTTPS?

HTTPs enables web servers and web browsers to establish secure connections. It encrypts data being transmitted in both directions. This helps prevent thieves from stealing  sensitive information along the way.

What is a Firewall?

What is a Firewall?

A firewall blocks outsiders from gaining unauthorized access to your computer and helps stop malicious software from infecting your computer.

What is a VPN?

What is a VPN?

A VPN is a virtual private connection to a VPN host server to hide your identity, address and online activity when using a public Internet connection. It does this by encrypting your data and turning them into “rubbish” so no one can make sense of it even if they get their hands on it.

Element Chat Review: How Secure Is It, Really?

Element Chat Review: How Secure Is It, Really?

Element is a secure messaging app for safer personal and corporate communication and other group chats.

SMBs 7 Deadly Cybersecurity Sins

SMBs 7 Deadly Cybersecurity Sins

How many of these seven deadly cybersecurity sins are you guilty of? Build a resilient cybersecurity strategy before it’s too late. 

What is a Remote Access Trojan (RAT)?

What is a Remote Access Trojan (RAT)?

A remote access Trojan is a software used by hackers to gain unauthorized access and remote control on a user’s computer or mobile device, including mouse and keyboard manipulation. 

What is Spam?

What is Spam?

Spam - spam emails, texts and sms messages (i.e. junk email), are unsolicited messages sent indiscriminately in bulk. Spam is a gigantic waste of time and resources.

What is a Botnet and How to Protect Your Business from One?

What is a Botnet and How to Protect Your Business from One?

A botnet is a network of computers that work as a collective to infiltrate your device. Here's how to protect your business from botnets.

What is a Keylogger?

What is a Keylogger?

Keylogger is a digital surveillance tool. They can track every click, touch, key stroke, download and conversation carried out on the device they are installed on