So what is MFA all about?

MFA (Multi Factor Authentication) or 2FA (2 Factor Authentication) is a simple yet effective way of improving the security of application services by adding another means of checking your identity…

Continue Reading So what is MFA all about?

Setting a standard

“The nice thing about standards is that you have so many to choose from” - Andrew S. Tanenbaum. Standards, sensibly implemented, can be a boon for your business. They are…

Continue Reading Setting a standard

Gone Phishing

Anatomy of a Phish Phishing. We hear about it all the time, with warnings abounding from IT and security experts. We know we will be targeted by it. We know…

Continue Reading Gone Phishing
Understanding Hash Values
Hashtag. Number sign, hash, or pound sign Vector Illustration

Understanding Hash Values

What is that MD5/SHA-1/SHA-256 thing I see when I go to download an application? When you download an application installer, you will often see file information listed beside the download…

Continue Reading Understanding Hash Values
Advice from the front line of Security – the SOC analyst
SIEM Security information and event management program in a tablet.

Advice from the front line of Security – the SOC analyst

Security Operations Threat Analysis As we are all aware many organisations have adopted working from home in response to the Covid 19 lockdowns. In  most cases, it is the first…

Continue Reading Advice from the front line of Security – the SOC analyst

The Importance of Rebooting

Why is reboot required? Rebooting helps the device to work better by clearing the temporary files stored in RAM, clears any process that is stuck inside the memory due to…

Continue Reading The Importance of Rebooting
Privacy Policy - Website Visitor Policy