Journal
$100 Million stolen through Cryptocurrency
$100 Million stolen through Cryptocurrency Cybercriminals stole $100 million in Cryptocurrency after hacking Horizon, a so-called Blockchain bridge. Harmony, the
The next generation of Authentication
The next generation of Authentication: Passwordless login techniques that are available today Authentication is the process of verifying a user’s
Benefits of Iso 27001 and How it can help your business?
The information security procedures that are in place within your Organization are designed to protect the Confidentiality, Integrity and Availability
Facebook 2FA Phish Scam
Facebook 2FA Phish Scam Reported by Sophos Recently, Social Media platforms are being widely used for carrying out various types
What Is Principle of Least Privilege & Why Do You Need It?
What Is the Principle of Least Privilege & Why Do You Need It? What Is the Principle of Least Privilege?
7 Really easy steps to prevent ransomware
What is ransomware? A ransomware is a type of malware that restricts access to the infected device, or threatens to
Should removable media be encrypted
We all use a variety of removable media in our daily lives, both for personal and professional use. We tend
Apple’s Lockdown Mode – Explained!
Apple’s Lockdown Mode – Explained! Apple has announced a new device protection feature known as “lockdown mode”. This mode severely
Understanding CERT-In’s new VPN Rules
Understanding CERT-In’s new VPN Rules CERT-In (The Indian Computer Emergency Response Team) announced a set of rules for VPN Providers
What is Cloud Security?
Introduction Cloud computing has been hailed as the future of business, with its ability to offer cheaper and more flexible
How Internal Audits can Help You Prevent Data Breaches?
Introduction A data breach is an event in which unauthorised individuals gain access to a company’s computers, networks or mobile
Intrusion Detection System [IDS] vs Intrusion Prevention System [IPS]
Introduction Intrusion Detection Systems [IDS] and Intrusion Prevention Systems [IPS] are two of the most important tools in any cybersecurity