The Zero Trust architecture offers an increasingly popular way to minimize cyber-risk in a world of hybrid cloud, flexible working and persistent threat actors. The post-pandemic normal for global organizations increasingly means using digital technology to support more flexible working practices. Although tech giants such as Twitter and Facebook made headlines by promising some employees they can work from home forever, … More Protecting the hybrid workplace through Zero Trust security
Are you on Facebook? So are scammers. Here are some of the most common con jobs on Facebook you should watch out for and how you can tell if you’re being scammed. While various social media platforms have popped up over the years, Facebook remains one of the most popular of them all. Case in … More Common Facebook scams and how to avoid them
You may not be able to escape internet trolls, but you have a choice about how you will deal with them – here’s how you can handle trolls without losing your cool. The term “internet troll” is widely associated with an online commenter or discussion participant whose sole aim is to stir up havoc by … More Don’t feed the trolls and other tips for avoiding online drama
Here are some quick and easy tips to help you clean up your cyber-clutter and keep your digital footprint tidy. You’ve probably heard the phrase “digital footprint” before, but do you really know what it is? Your social media content, various online payment transactions, location history, emails sent, messages sent through instant messaging platforms, and … More Spring cleaning? Don’t forget about your digital footprint
Some personal information just doesn’t age – here’s what the Facebook data leak may mean for you. ‘Half a billion Facebook users’ data breached’, this or something very similar is a headline you may have seen in the media in recent days. Any data breach, especially one that affects such a large quantity of users, … More Does data stolen in a data breach expire?