Everyone who uses the Internet to browse, use email, or for Social Media leaves traces behind. A high-value industry, led by Google, has grown up around analyzing, processing, and collating… Read more »
One area of increasing concern to Cyber Security is the intersection of AI, Big Data, personal privacy, and ID Theft. Privacy concerns arise when using data containing personal information. For… Read more »
Online Security has emerged as one of the top ICT areas of concern. It’s not just in the general areas of malware protection and network security. As the use of… Read more »
In answer to the question “Are University Records Safe from Cyber Attacks?”, the answer is no, they are just as safe as any other complex and extensive, often multi-site corporate… Read more »
The phrase “Google It” has become part of the language, demonstrating just how dependent we are becoming on using browsers to find out things and communicate with each other. We… Read more »
The internet can be a magical place, particularly for children, but the Internet can be inherently dangerous. It provides children with education and entertainment at, unfortunately, significant risk, The risks… Read more »
The technical side of network security is a complex ongoing dogfight between the white hats of network security and the black hats of hackers and other cybercriminals. As a result,… Read more »
Part of any IT Security policy is to ensure that as far as possible, websites are genuine. Sometimes you are presented with a message saying a site has failed a… Read more »
The first step in understanding the need for Cyber Security Solutions in the context of the IoT is to understand what the IoT actually is. Simply put, it is connecting… Read more »
Digital convergence, the Internet and the spread of personal smart devices has brought about a revolution in personal connectivity. With the increasing numbers of free WiFi services in municipal areas… Read more »