Web

A category showcasing all the types and advantages of web and internet security.

Email Mistakes

Email Mistakes That Can Cause Serious Data Security Breaches

Email mistakes caused by careless human error is one of the main causes of IT mail problems. Many companies know how disastrous these mistakes can be. As the Ponemon Institute’s 2014 Cost of Data Breach Study pointed out, nearly one-third of all data breaches were caused by careless human error. Email mistakes in particular stand …

Email Mistakes That Can Cause Serious Data Security Breaches Read More »

cyberthreat

Cyberthreat Affecting 950 Million Mobile Devices

Cyberthreat vulnerabilities are everywhere. Cybersecurity firm Zimperium announced in July 2015 that it had discovered a major vulnerability in Google’s Android mobile operating system. The flaw potentially allows hackers to access approximately 95% of all Android smartphones and tablets. That adds up to around 950 million mobile devices that are at risk. A Uniquely Dangerous …

Cyberthreat Affecting 950 Million Mobile Devices Read More »

The Top Ten Tips to Protect Yourself from Malware

1. Do not open suspicious looking emails or click on URLs / hyperlinks in such mails. This cannot be stressed enough and is still a major reason for infection. If in doubt, delete! For businesses it is worth employing third party cloud-based email hygiene subscription services (such as our email software). These scan emails before they are delivered. They …

The Top Ten Tips to Protect Yourself from Malware Read More »

5 Big Security Threats you could face in 2015

2014 was completely disastrous from a security point of view for companies and people alike. Apple’s iCloud breach saw private celebrity photos leaked, the most memorable security breach of 2014 was Sony Pictures who was   thanks to a breach in Apple’s iCloud, Sony Pictures was the victim of it all but crippled the company and the …

5 Big Security Threats you could face in 2015 Read More »

Information Security Password strength is key

In today’s technologically driven business marketplace one of most often overlooked points of vulnerability to your business and personal information security is the strength or weakness of the passwords that you define for usage when logging into: your computer network, email provider, online banking, accounting or payroll applications. To underestimate the importance of strong passwords …

Information Security Password strength is key Read More »

Scroll to Top