"Kill Chain," was a term originally used by the military to define the steps the enemy uses to attack a target. In the same way, a "Cyber Kill Chain," is a similar notion but relates to cyber-based attacks. It's a process that centres around understanding each of these stages so
Read MoreThe main reason for using USB sticks is to transfer data from one computer to another. It may not necessarily be to even give to someone else, but to take home to do some work or move onto a laptop before going on a business trip. USB sticks are prone
Read MoreEven though we’d like to think we’ve taken all precautions when it comes to securing our business, hackers continually evolve and find innovative ways to find the vulnerabilities in modern business networks. Here’s an article by Martin Horan from FTP Today that talks about what you can do to
Read MoreA recent tweet from UK politician Nadine Dorries set cause for alarm. Her tweet was an attempt to defend fellow political Damien Green who was recently in the spotlight for allegedly accessing porn using his government login. Here is a screenshot of the tweet: Read More
Here's a great article from Time by Jeff John Roberts on the benefits of cloud. Because we are in a content heavy world, cloud plays a convenient storage space, however, this also poses it's own security threats - think back to the Jennifer Lawrence incident back in 2014. Read
Read More