Skip to main content


Scammers are after you…

The number of cyber-attacks are increasing and the cyber crime syndicates will use any method possible to get you to part with your hard earned money. They are after sensitive data, credit card information and “facilitation fees”. Every single person is a target and rest assured that the cyber criminal does not discriminate.
In this piece I will speak about the use of social media to kick off a cyber attack. I will use a real example that we encountered this week and it is important to note that these types of attacks happen across all platforms. Older people are also seen as soft targets because the criminals rely on their trusting nature and limited knowledge of the new digital world we live in.

Read more …Scammers are after you…

  • Created on .
  • Hits: 1807

Passwords Passwords Everywhere…

The growth of cyber-attacks is well documented and every single cyber security enterprise is talking about Cyber Resilience to improve your business’ security posture. The term is being used so much and yet we are still not really helping the average technology user understand the importance or exactly what it means and what they can do to lower their risk.

Often the focus on corporate risks and acceptable use policies is lost on the end user. Constantly referring only to the policy will not influence the user to adjust behaviour. In order to make real change we need to focus more on procedures, steps and the personal impact of better cyber hygiene to help our users be more secure. When our users know what to do and what to look out for, they will be better protected at home and automatically by association more secure at work.

Read more …Passwords Passwords Everywhere…

  • Created on .
  • Hits: 1441

From the Inside, out

As humans, we tend to draw all our focus outwards - how people look, how successful a business is from their office space, how safe a home is depending on the high walls and electric fencing.

This is the same for Cyber Security. Companies focus on outsider threats.

They make sure they are equipped to defend against hackers infiltrating through malware or social engineering tactics skimming over the fact that a large amount of breaches that occur are due to insider threats.

An insider threat can be a user who causes a breach through careless behaviour or an employee that is deliberately causing the business harm by stealing information or hacking into the organisation to spread malware which causes major damage and data loss.

Read more …From the Inside, out

  • Created on .
  • Hits: 1523

Cheap Cyber Security = Costly Damage Control

It seems that when it comes to Cyber Security, people go for the cheapest option, not the most effective and secure.

It is becoming more and more apparent that this way of thinking indicates that you do not know how important Cyber Security is for the productivity of your organisation.

Yes, there are people out there that are overpriced and you should find the most cost effective option but cost effective doesn’t mean the cheapest option that doesn’t give you the full protection you require.

If you are informed and know what is needed as a baseline, you would know that you can get great support and protection for a good price.

Cyber Security has been at the forefront of the news lately and breaches are at an all-time high, meaning that if your organisation hasn’t been breached, it is only a matter of time.

Read more …Cheap Cyber Security = Costly Damage Control

  • Created on .
  • Hits: 1535

Trust No One

We are told as children not to speak to strangers and to only trust those we know. Why as adults have we forgot this and seem to engage and share personal details online to those we don’t know?

The online world does a very good job at making you think that your information is safe when shared and encourages you to share as much as possible, yet often the sites/apps have very little security measures in place to protect all your information.

This is why you need to be cyber smart and not only rely on a third party to have all their cyber security ducks in a row.

You need to heed that childhood advice and start to be more careful with what you share and with whom you share it.

With online threats at an all time high and with your personal sharing at an all time high, it is a recipe for disaster if you don’t follow your best practices.

Read more …Trust No One

  • Created on .
  • Hits: 1525

Safety first

Cyber security needs to be taken as seriously as you take your, your family and friends’ safety.

Just like you message someone to find out if they are home safe, you need to start checking that the people around you are not using compromised passwords, have different passwords for each account and that they have a multi-layered security system in place.

It is becoming more and more dangerous in this cyberworld to not have any structures in place to fight back against a cybercriminal.

Organisations are losing thousands and individuals are even losing their life savings.

Hackers are working harder and smarter, it is up to you to make sure you are doing all you can to prevent yourself falling victim.

Read more …Safety first

  • Created on .
  • Hits: 1428

Be Accountable for your Accounts

When you think of your internet banking, you know it is your most secure account with a difficult password and multi-factor authentication.

In your mind, that is how it will be most secure, and it definitely helps but have you ever thought about other accounts that have your credit card details? If they are breached, it is the same as your online banking being breached.

I heard someone say they don’t worry too much about their Netflix password because what, is someone going to watch a movie for free?

Unfortunately, what they forgot was that they entered their card details into Netflix to activate the account.

Read more …Be Accountable for your Accounts

  • Created on .
  • Hits: 1429