What is Encryption & 4 Reasons you Should be Using it Table of Contents Toggle What is data encryption?Types of encryptionSymmetric encryptionAsymmetric encryptionFour benefits for organisations using data encryption:1. It helps you move into the cloud and stay...
The Dark World of Spam & Phishing – How to Protect Yourself Table of Contents Toggle How spam and phishing scams workViruses, Ransomware and SpywarePhishing scamsSpear-phishing scamsWhat does a spam email or phishing attempt look like?Tips for staying safe...
Your Guide to the Cyber Essentials Certifications Table of Contents Toggle What is the Cyber Essentials scheme?1. Have a firewall installed2. Use secure configurations3. Control user access4. Protect yourself against malware5. Make sure software and devices are...
What is a Firewall and How to Choose the Right one for you Table of Contents Toggle What is a firewall?Why does my organisation need one?Different types of firewallsWhat should I look for in my firewall? When a layperson is asked about cybersecurity, “firewall” is...
Does your Organisation Need Mobile Device Management? Table of Contents Toggle The rise of BYOD cultureWhat to include in a personal mobile device policy?What is MDM software?Manage personal devicesControls employees accessSecure storageLimitations of MDM softwareDo I...