Journal

What is HIPAA Violation? Examples and how to avoid them
Introduction Health Insurance Portability and Accountability Act [HIPAA] is a set of rules and regulations that govern how medical information

HIPAA Compliance Checklist: Essential Things You Must Know It
HIPAA Compliance Checklist: A 10-point checklist to make sure your Organisation achieves HIPAA Complaince! Before we get into the checklist,

Security Compliance: All You Need To Know About It and Importance
What is security Compliance? Information security has become a major concern for Organizations, especially in the current digital era. The

ISO 27001 Controls: What is it and why it is necessary?
What is ISO 27001? ISO 27001 is a popular certification that can help Organizations manage their information security risks better.

What Is Security Assessment? How Does It Work?
Introduction If you’re a business owner, you probably know how important it is to keep your company safe from cyberattacks.

ISO 27001 Checklist: 9-step Implementation Guide
ISO 27001 Checklist: 9-step Implementation Guide Introduction Implementing ISO 27001 can be a difficult process, but it’s also vitally important

LastPass Data Breach: Source code stolen
LastPass is a password manager that allows you to store all of your passwords in one place, so you don’t

Malware Attack – Common ways an Android phone can get infected.
What is Malware? Malware is short for “malicious software.” It’s a general term that refers to any type of software

What is Metadata? How can it be useful in Cyber Forensics?
Introduction: What is Metadata? Metadata is data that describes other data. It’s most often used in digital files, but it’s

What Does Phishing Mean, Types, Risks And How To Prevent It
What Does Phishing Mean, Types, Risks And How To Prevent It What does phishing mean? Phishing is a type of

BYOD (Bring Your Own Device): Advantages and Disadvantages and Risks
BYOD (Bring Your Own Device): Advantages and Disadvantages and Risks What is a BYOD (Bring Your Own Device) Policy? BYOD

What is Penetration testing? Methods & Steps involved
Penetration testing is a method to detect vulnerabilities in IT systems and networks. This is an ongoing process; some of