Skip to content

cyber security awareness training

Making Assumptions During Communication

(You know what they say about ‘assume’!) Visualise it: you’re in a meeting, discussing the budget for the Security Division. You begin to state your… Read More »Making Assumptions During Communication

11 Ways to Protect Your Phone

Smartphones have evolved in gigantic leaps over the years. You can now use your phones for virtually anything: from paying bills, to checking important emails,… Read More »11 Ways to Protect Your Phone

Utilities of an Ethical Hacking Course

The increase in computer and mobile technology has led to greater threats in security. This could be in the form of viruses that can crash… Read More »Utilities of an Ethical Hacking Course

IFRAME Injection Attacks Via FTP

Back in May and continuing into June, we saw a sharp increase in the number of compromised websites due to the Gumblar infection.  This virus/malware would… Read More »IFRAME Injection Attacks Via FTP

How to Get Rid of Gumblar Virus

Gumblar infection procedure. When an infected website is browsed the virus is downloaded in the computer and it start looking for a FTP (File Transfer… Read More »How to Get Rid of Gumblar Virus

The People Behind Internet Scams

Have you ever wondered what kind of person would purposely scam innocent people out of their money on the Internet? These people thrive on the… Read More »The People Behind Internet Scams

How DDoS Detection Is Possible

DDoS (distributed denial of service) attack perpetrators are usually quite anonymous and stealthy. Even so, detecting the threat of an attack proactively is possible. DDoS… Read More »How DDoS Detection Is Possible

Lost a Multilingual PST File Password

Experts suggest that using a complex password for data protection is a good practice to retain data confidentiality. To implement the same, users usually employ… Read More »Lost a Multilingual PST File Password

Sunbelt Software Counter Spy

You want to wash that Spyware and Adware out Sunbelt software counter spy Spyware and Adware are not only an ever increasing nuisance for computer… Read More »Sunbelt Software Counter Spy

Plagiarism and Your Copyright Rights

It is a sobering fact – plagiarism is part of a writers life. I have been posting articles on the internet since 1999 and having… Read More »Plagiarism and Your Copyright Rights

3 Leadership Books on Power

Power is a tricky topic. Fortunately there are some great leadership books to help us navigate the pitfalls. Here are three contemporary authors who deliver.… Read More »3 Leadership Books on Power

How to Be a Transcriber Online

Self-improvement, a long way from being a hazardous decision, is most likely one of the most secure. You can simply lose your activity, however no… Read More »How to Be a Transcriber Online

Free Cyber security Assessment

Global Cyber Security Centre

CONSULTANCY

Support