Empowering Your Cyber Awareness: A Non-Technical GuideIn today’s interconnected world, cybersecurity awareness is not just a responsibility for IT experts; it is a necessity for everyone…Oct 19, 2023Oct 19, 2023
What next after a password leakChange your password immediately. Access your device e.g. phone, tablet, desktop/laptop and change your password to a stronger one. In…Aug 4, 2022Aug 4, 2022
Cybersecurity Maturity JourneyWith the shift of business data from paper-based, highly secure information that is stored in locked physical cabinets, to digital…Jul 19, 2022Jul 19, 2022
CALLBACK PHISHING EMAILSHackers impersonate CrowdStrike Cybersecurity CompanyJul 18, 2022Jul 18, 2022
Cybersecurity PoliciesA cybersecurity policy is a document that stipulates an organization’s cybersecurity vision. It demonstrates an organization’s commitment…Jul 12, 2022Jul 12, 2022
Security Operations Center CharterSecurity Operations Center (SOC) ensures organizational cyber well-being by monitoring the infrastructure and managing its cyber hygiene…Jul 8, 20221Jul 8, 20221
European Union Data Protection Code of Conduct for Cloud Service ProvidersEuropean Union (EU) Data protection code only applies to “business-to-business” (B2B) cloud services where the Cloud Service Provider (CSP)…May 6, 2022May 6, 2022
Facebook Rebrand to MetaOn October 2021, Facebook, the company that owns social platforms including Facebook, Instagram and WhatsApp, rebranded to Meta. The…Nov 3, 2021Nov 3, 2021