Everyone who uses the Internet to browse, use email, or for Social Media leaves traces behind. A high-value industry, led by Google, has grown up around analyzing, processing, and collating… Read more »
One area of increasing concern to Cyber Security is the intersection of AI, Big Data, personal privacy, and ID Theft. Privacy concerns arise when using data containing personal information. For… Read more »
Online Security has emerged as one of the top ICT areas of concern. It’s not just in the general areas of malware protection and network security. As the use of… Read more »
In answer to the question “Are University Records Safe from Cyber Attacks?”, the answer is no, they are just as safe as any other complex and extensive, often multi-site corporate… Read more »
The phrase “Google It” has become part of the language, demonstrating just how dependent we are becoming on using browsers to find out things and communicate with each other. We… Read more »
One significant aspect of the change to the work environment in recent years has been the emergence of the road warrior, the mobile worker. In essence, the difference between the… Read more »
The technical side of network security is a complex ongoing dogfight between the white hats of network security and the black hats of hackers and other cybercriminals. As a result,… Read more »
Part of any IT Security policy is to ensure that as far as possible, websites are genuine. Sometimes you are presented with a message saying a site has failed a… Read more »
The first step in understanding the need for Cyber Security Solutions in the context of the IoT is to understand what the IoT actually is. Simply put, it is connecting… Read more »
While most security thoughts seem to lie around hardware and software, there is one other major threat that seems to slip by without much public discussion. That is the threat… Read more »