Windows 11 Security Tips, Keeping You Safe
In this post we will look at some basic security mechanisms that you can use to help keep you safe from online threats. General Security Tips Be careful when connecting…
Read moreExploitation of Critical MOVEit Transfer Vulnerability Observed By Rapid7
In the post regarding the initial MOVEit Transfer vulnerability Rapid7 is seeing exploitation of 3 vulnerabilities in MOVEit Transfer software. The first vulnerability was given a CVE on June 2nd…
Read moreAustralian Scamming Victims Meet with Government Officials
In this 2nd part to my other post regarding scammers taking millions from Australians, we see some of the scamming victims meet with government officials who are not aware of…
Read more3 Types of Data Protection and the Difference Between Data Privacy and Data Security
In this post we will look at the 3 types of data protection as well as look at the difference between data protection and data security. 3 Types of…
Read moreWhat is Data Privacy and Why is Data Privacy Important?
Data Privacy Defined Data privacy is the ability for one to control how, what, and where our personal or confidential information is gathered, stored or shared. This was important way…
Read moreHow to Prevent a Cyber Attack
An organization is never 100% safe from a cyber attack. The more you education your employees on what to be vigilant for and how to practice creating secure passwords, the…
Read moreWhat is the Chamois Botnet?
In March 2017 the Android security team had detected, analysed and eliminated a sophisticated botnet which was built on compromised apps that work together to power ad and SMS fraud.…
Read moreHow to Create a Strong Secure Password & How to Keep Your Password Safe?
In this day and age the internet is an integral part of our lives. Everything we do can be found online from banking to healthcare and can be found on…
Read moreWho are Lace Tempest?
The on going attack of Progress Software MOVEit Transfer applications has been attributed by Microsoft to Lace Tempest. The Microsoft threat intelligence team has been quoted as follows: "Exploitation is…
Read moreHow to Properly Dispose of Your Mobile Devices
Mobile devices from smartphones, watches and tablets continue to advance at rapid rate. One may replace their devices as often as once a year. What one doesn't realize is just…
Read more