From incident to resolution: Essential steps to survive a cyberattack

From incident to resolution: Essential steps to survive a cyberattack

Monitoring all the events in your corporate network is big data “business.” Any observable phenomena – from logins to downloads, scripts, updates, configuration changes, etc. – happening across all the endpoints, servers, routers, switches and other infrastructure in...
Was your Amazon account hacked? Here’s what you need to do

Was your Amazon account hacked? Here’s what you need to do

Amazon stands for huge selection, fair prices and good service. This is where you go shopping when everything should be as smooth, fast and easy as possible. But with the popularity of Amazon, the security risks are also growing. More and more hackers try to crack...
Simple social media steps to help small businesses get back on top in the post-pandemic landscape

Simple social media steps to help small businesses get back on top in the post-pandemic landscape

The post-Covid-19 business landscape is slowly taking shape. The continued observation of social distancing is a must, shoppers are filtering back to the high street and businesses are taking the first tentative steps towards some sense of normality. However, there...
How to stay safe with online learning

How to stay safe with online learning

Online classes have never been more popular, or as important, as during the Covid-19 pandemic. The pandemic may be showing signs of receding in some parts of the world but with good reason many educational institutes are staying with online learning for now. One...
How small businesses can insure against damage caused by a second wave of Covid-19

How small businesses can insure against damage caused by a second wave of Covid-19

After months of lockdown perhaps we’ve been lulled into thinking that the Covid-19 outbreak is in decline despite a few outbreaks here and there. However, the nature of pandemics is one of waves. Without a vaccine, pandemics can spring back to life, disrupting the...
How to identify and guard against spear phishing

How to identify and guard against spear phishing

Spear phishing is a phishing attack that is targeted against an individual. These emails are designed so that victims trust the message enough to open it and act on it. They are sophisticated and are carefully crafted so they appear to come from a trusted contact,...