Blog
The three wise men of digital risk
January 1, 2020
0 Comment
By Chris Miller
Most people know the nativity and its key characters – how Jesus came to be born in a stable to Mary and Joseph. How he was visited by shepherds, guided there by an angel, and the three wise men who arrived, following a star, each bearing a gift for the
20 tips for 2020: Be smarter with your smartphone
December 31, 2019
0 Comment
By Amer Owaida
Yesterday, we discussed bad cybersecurity habits you should avoid in 2020, especially where computers are involved. We’re not done yet. Some of the recommendations apply to both computers and smartphones, such as being especially wary when connecting to a public Wi-Fi network. Our upcoming cybersecurity tips are more smartphone-centric. Authentication You’d
Cybersecurity threats to watch out for
December 31, 2019
0 Comment
By Tyler Moffitt
The internet can be a hostile environment. The threat of cyberattack is ever-present as new vulnerabilities are released and a commodity of tools are produced to exploit them. Therefore, the pressure on organisations (and their employees) to protect customer data and defend against attacks, is mounting. But aside from using Firewalls and antivirus
Adjust these important settings on your new Android phone or tablet
December 31, 2019
0 Comment
By JAMES GELINAS
Was an Android device waiting for you under the tree this year? Google’s in-house operating system ignited a smartphone revolution across the world. And now, the handsets are so advanced they’re putting Apple’s top tier products to shame. Naturally, new Android users are bound to have questions. The operating system
5 Undeniable Reasons To Prioritize Enterprise IoT Security
December 31, 2019
0 Comment
By Jeff Orr
The “Internet of Things” (IoT) is already a part of the enterprise, whether cyber security administrators are ready or not. Thanks to advances in network technology, seizing control of connected devices has become an active, and menacing, threat to the enterprise professional. Distributed denial-of-service (DDoS) threats have remained a concern for




