Blog

Your Company's secrets. Are they as secure as you believe them to be? 

25.08.25 01:11 PM - By Marie-Bernette Smal - Comment(s)
Your Company's secrets. Are they as secure as you believe them to be? 
How open-source intelligence (OSINT) gives cybercriminals the tools to uncover vulnerabilities, exploit employees, and launch devastating attacks.

What constitutes a comprehensive patch management policy?

25.08.25 01:03 PM - By Marie-Bernette Smal - Comment(s)

By definition, a patch is a set of changes to a computer program or its supporting data designed to update or improve it. Significantly, patches have become synonymous with fixing security vulnerabilities and other “bugs”.

Patch management is the process of overseeing the systematic deployment of the...

Password protection is more critical than ever. Here are ten top tips

25.08.25 12:21 PM - By Marie-Bernette Smal - Comment(s)
Why weak passwords still put global giants at risk — and how you can strengthen your own defences with practical steps today.

Does ransomware’s evolution point to a cybercrime apocalypse?

25.08.25 11:20 AM - By Marie-Bernette Smal - Comment(s)

One of the first ransomware attacks ever documented was the AIDS Trojan – also known as the PC Cyborg Virus. Conceived in 1989, it was released on 20,000 infected floppy diskettes labelled “AIDS Information – Introductory Diskettes” and disseminated to attendees at the World Health Organization's AI...