Whenever you are online, it pays to be vigilant. This is especially true when you need to hand over personal information such as your email address via a website contact form. The first thing to look out for is the URL of the website, which should start with https:// This …
207/39: infographic – #BeCyberSmart
This is why you need policies and procedures – #BeCyberSmart
A quick watch of 15 seconds of the Linus Tech Tips video below will illustrate the problem I am going to highlight today. So here is the question you need to answer: If you provide your team with work laptops – can they then lend them to their children/partner/friend/next-door neighbour …
Continue reading “This is why you need policies and procedures – #BeCyberSmart”
Check your essential protection from ransomware – #BeCyberSmart
Ransomware is a constant cybersecurity threat to everyone – and the threat is increasing. A back-up with offline retention is an essential step in your ransomware and crypto-malware defences.
Trust – #BeCyberSmart
Trust is relative, ranging from not trusting at all, to the complete trust that arises based on commonly shared expectations of honest cooperative behaviour. Francis Fukuyama, a political scientist, first defined trust in this way in his book Trust, 1995. The very fact that he could write a whole book …
A quickie on Sunday – #BeCyberSmart
Security objectives are business objectives too
I just have to use my slippery fish analogy again… – #BeCyberSmart
As a business owner or board member you have to think about the cybersecurity challenges know how your information is protected at all times. But just like a slippery fish when you think you are on top of it – it slips out of your hands… Because someone asks a …
Continue reading “I just have to use my slippery fish analogy again… – #BeCyberSmart”