Password policies

Graphic of padlocks, one of them open

Passwords

By Roddy Passwords, pah! Old-fashioned, insecure. Don’t cha just hate ‘em? Well no, they’re OK, especially if handled thoughtfully and...
hack-3671982_1280

Teaching your Nanna about Cyber Security

By Eve Ferguson. Most grandparents are now joining the world of smartphones, social media, internet banking and following the global...
phishing-3390518_1280

So, What’s Phishing?

By Amelia McGuigan (Cyber Security Student). After the fifth text message this week inviting me to click on a suspicious...
data-breach

Data breaches: A story that seems to never end

By Farhan Subhan. Throughout our time on planet Earth, there have been major developments in nearly all aspects of life;...
security-265130_1920

Passwords and Paranoia

By Anton Scott. The issue with universal passwords We have all been there, midway through creating a new account for...
anonymous-4165613_1920

The importance of Ethical Hacking

By Shameer Sabar. As technology advances, and organisations incorporate more and more IT systems into their business in order to...
shutterstock_235677985-e1478983358134

Phishing and the cost of your information

By Aqsa Hussain. Do you remember receiving that email some time ago mentioning ‘Here is an invoice to the flight...
shutterstock_348905468-e1477771560621

Security fatigue

   By Philip Smedegaard "Please update your password settings. Please enter a new password that does not include your birthday. Password...
credit-card-1591492_1280

Secrets (and lies)

Phase 3  - The execution Somewhere in a call centre…. Call centre operative: Hello, helpdesk, how can I be of assistance?...