Password policies

Graphic of padlocks, one of them open

Passwords

By Roddy Passwords, pah! Old-fashioned, insecure. Don’t cha just hate ‘em? Well no, they’re OK, especially if handled thoughtfully and...
A thief sneaking away with a credit card from a laptop.

Teaching your Nanna about Cyber Security

By Eve Ferguson. Most grandparents are now joining the world of smartphones, social media, internet banking and following the global...
Silhouette with fishing rod targeting a man's laptop, symbolizing phishing.

So, What’s Phishing?

By Amelia McGuigan (Cyber Security Student). After the fifth text message this week inviting me to click on a suspicious...
Word cloud highlighting key terms related to cybersecurity.

Data breaches: A story that seems to never end

By Farhan Subhan. Throughout our time on planet Earth, there have been major developments in nearly all aspects of life;...
Cursor hovering over the word 'Security' on a digital screen.

Passwords and Paranoia

By Anton Scott. The issue with universal passwords We have all been there, midway through creating a new account for...
Person wearing a Guy Fawkes mask using a laptop in a dark setting.

The importance of Ethical Hacking

By Shameer Sabar. As technology advances, and organisations incorporate more and more IT systems into their business in order to...
A hacker stealing personal information from a computer user.

Phishing and the cost of your information

By Aqsa Hussain. Do you remember receiving that email some time ago mentioning ‘Here is an invoice to the flight...
Person typing on a modern keyboard with floating letters around.

Security fatigue

   By Philip Smedegaard "Please update your password settings. Please enter a new password that does not include your birthday. Password...
A lock pick tool placed on several credit cards.

Secrets (and lies)

Phase 3  - The execution Somewhere in a call centre…. Call centre operative: Hello, helpdesk, how can I be of assistance?...