Category Archives: Blog

So what is MFA all about?

MFA (Multi Factor Authentication) or 2FA (2 Factor Authentication) is a simple yet effective way of improving the security of application services by adding another means of checking your identity when logging in. The trouble with passwords as the sole means of authentication is that even while a password may be secure in that it […]

Setting a standard

“The nice thing about standards is that you have so many to choose from” – Andrew S. Tanenbaum. Standards, sensibly implemented, can be a boon for your business. They are a great way to set focus and ensure that you target resources where they need to be, boosting efficiency and ensuring that you don’t spend […]

Five Common IT Security Vulnerabilities and How to Avoid Them

In this article, technical experts from our partners Appcheck are looking at five of the most common IT security vulnerabilities and how to avoid them. Remote Command/Code Execution (RCE) We thought we would start off with a topical one with recent discussions around critical vulnerabilities within SaltStack infrastructure automation software. Two CVE’s were discovered in […]

Gone Phishing

Anatomy of a Phish Phishing. We hear about it all the time, with warnings abounding from IT and security experts. We know we will be targeted by it. We know that possibly we, or a colleague, may get caught. With the sheer amount of phishing attempts out there, and the high quality compared to days […]

Understanding Hash Values

What is that MD5/SHA-1/SHA-256 thing I see when I go to download an application? When you download an application installer, you will often see file information listed beside the download link. Usually you will see one or more hash values in the information. So, what’s that all about? Let’s say you want to download the […]

I’ve asked a forensics company to do some work for us. What should I expect back from them?

The background: Mary from Accounts, having fallen under suspicion for her snack purchases, has been responsible for kicking off a major internal investigation in your company. It looks like she may have misused her company laptop and muddied the line between corporate and personal spending. So you’ve had the forensics people in, and they’ve taken […]

The Importance of Rebooting

Security Operations

Why is reboot required? Rebooting helps the device to work better by clearing the temporary files stored in RAM, clears any process that is stuck inside the memory due to glitches and installs the new updates. From a security point of view, it is important to patch up with the necessary updates released by the […]