How to protect yourself from KRACK, the WiFi hack!
A weakness in the WiFi protocol places virtually all wireless-enabled devices at risk! WPA2, a WiFi security protocol found at the heart of most modern
A weakness in the WiFi protocol places virtually all wireless-enabled devices at risk! WPA2, a WiFi security protocol found at the heart of most modern
Introduction A new wave of ransomware attacks targeting organizations across the world has been reported June 27, 2017. Reports indicate around 2,000 attacked users so
A computer virus is typically defined as a malware program that replicates itself by inserting copies or modified copies of itself into other computer programs,
you can check the strength of your passwords using tools like this http://www.passwordmeter.com/
Spyware is a type of malicious software that is spread around on the internet. The term spyware is used to describe software that carries out
Data exfiltration is formally defined as the unauthorised transfer of sensitive information from a target’s system or network by an attacker to another location. Data
use 2 factor authentication to be safe when accessing your e-mails or social media accounts on untrusted or public computers
As computer processing power increases the security of traditional passwords decreases due to vulnerability to what is known as dictionary attacks or brute force attacks.
Avoid entering sensitive data like your credit card numbers or any other financial or sensitive information into any public computer.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
This methodology requires the most effort to implement but it results in the most optimised recurring cost and will provide the best scalability for apps. This involves re-adapting the code of applications and the heavy use of SAAS solutions in order to replace existing hosted applications.
This method utilizes the power of PAAS services, like transferring a database to an as-a-service model, the use of containers for some apps or the use of network/security functions as a service. Greater scalability and lower cost of operation is achieved.
the migration of workloads from to the cloud without changing the architecture. Machines get to keep their OS and apps. This is the quickest and easy way to migrate, but since its utilising IAAS, its is also the most expensive on the long term.