The MeEmpowering Your Cyber Awareness: A Non-Technical GuideIn today’s interconnected world, cybersecurity awareness is not just a responsibility for IT experts; it is a necessity for everyone…Oct 19, 2023Oct 19, 2023
The MeWhat next after a password leakChange your password immediately. Access your device e.g. phone, tablet, desktop/laptop and change your password to a stronger one. In…Aug 4, 2022Aug 4, 2022
The MeCybersecurity Maturity JourneyWith the shift of business data from paper-based, highly secure information that is stored in locked physical cabinets, to digital…Jul 19, 2022Jul 19, 2022
The MeCALLBACK PHISHING EMAILSHackers impersonate CrowdStrike Cybersecurity CompanyJul 18, 2022Jul 18, 2022
The MeCybersecurity PoliciesA cybersecurity policy is a document that stipulates an organization’s cybersecurity vision. It demonstrates an organization’s commitment…Jul 12, 2022Jul 12, 2022
The MeSecurity Operations Center CharterSecurity Operations Center (SOC) ensures organizational cyber well-being by monitoring the infrastructure and managing its cyber hygiene…Jul 8, 20221Jul 8, 20221
The MeEuropean Union Data Protection Code of Conduct for Cloud Service ProvidersEuropean Union (EU) Data protection code only applies to “business-to-business” (B2B) cloud services where the Cloud Service Provider (CSP)…May 6, 2022May 6, 2022
The MeFacebook Rebrand to MetaOn October 2021, Facebook, the company that owns social platforms including Facebook, Instagram and WhatsApp, rebranded to Meta. The…Nov 3, 2021Nov 3, 2021