- Uncategorized
- SMB
- Respond
- Recover
- Protect
- Phishing
- Password
- Newsletter
- Identify
- Govern
- Detect
- Daily Tips
- Cyber Skool Rools
- Cyber Digist
- All
- AI
Use secure connections (HTTPS) online.
Using secure connections (HTTPS) online is essential for protecting your data and privacy. HTTPS encrypts the communication between your browser […]
Review and limit app permissions.
Regularly check the permissions granted to each app and disable any that seem unnecessary or intrusive. This ensures that apps […]
Don’t install unnecessary apps.
Avoiding the installation of unnecessary apps is a smart practice for maintaining device security and performance. Unnecessary apps can pose […]
Disable Bluetooth when not in use.
Disabling Bluetooth when not in use is a good practice to enhance security. Keeping Bluetooth off minimizes the risk of […]
Why God, Why?
Written on one of the many support columns which hold up the M8 motorway in Glasgow as it heads onto […]
Conduct regular security training.
Conducting regular security training is essential for keeping everyone up-to-date on best practices and emerging threats. These sessions can cover […]
Avoid using public charging stations.
It’s wise to avoid using public charging stations, as they can pose security risks. Public chargers may be tampered with […]
Clean Desk Policy
Keep a clean desk policy to protect sensitive info.Maintaining a clean desk policy is essential for protecting sensitive information. By […]
Report lost or stolen devices promptly.
Reporting lost or stolen devices promptly is crucial for minimizing the risk of data breaches and unauthorized access. Notify your […]
Be sceptical of unsolicited communications.
Being skeptical of unsolicited communications is crucial for cybersecurity. Whether it’s emails, phone calls, or messages, always approach unexpected contacts […]
The Perfect Storm
Legacy OT Systems Running Out-of-Support Operating SystemsFirst, what is OT? Operational Technology (OT) refers to the systems and software used […]
Keep your security software up to date.
Keeping your security software up to date is vital for protecting your devices from new threats. Regular updates ensure that […]
Never share your passwords!
Never sharing passwords is a fundamental rule of maintaining cybersecurity. Sharing passwords can compromise your accounts and sensitive information. Always […]
Know the signs of a compromised device.
Recognizing the signs of a compromised device includes looking for slow performance, unusual pop-ups, unauthorized applications, high data usage, battery […]
Secure physical access to your devices.
Securing physical access to your devices is a critical component of overall security. Ensure that only authorized individuals can physically […]
Implement role-based access.
Role-based access is a crucial strategy to enhance security and manage permissions effectively. It involves granting access to resources and […]
Audit security protocols regularly.
Regular audits of security protocols are essential for maintaining a strong security posture. These audits help identify and address vulnerabilities, […]
Educate your colleagues on cybersecurity.
Educating your colleagues on cybersecurity is vital for maintaining a secure environment. By promoting awareness and best practices, you can […]
Use VPNs when accessing public Wi-Fi.
Using VPNs when accessing public Wi-Fi is a smart security measure. Public Wi-Fi networks are often less secure and can […]