Articles in this category Password Managers It can be difficult to keep track of the passwords that you use. The temptation is to write them down which isn't a good idea or use the same password all the time. An alternative and better solutio... Anti-Virus Software Installing anti-virus software is one of the easiest and most effective ways to protect your computer, but you need to make sure you keep the malware definitions up-to-date. Anti-virus software are co... Account Security Overview This article contains information on Tips for creating a strong password Passwords provide the first line of defense against unauthorized access to your computer. The stronger your password, the more protected your computer will be from hackers and malicious software. You ... Online Shopping - Staying Safe Tips and Guidance Today, you can buy so many goods and services online. It is an easy option as you can literally shop from your armchair. But before you press the 'buy' button have a read through our tips to help you ... Preventing Data Theft What would happen if someone outside your business – a competitor or a criminal – got hold of your data? Or what if someone from inside your business accidentally or deliberately released important bu... Why It's Important to Accept Software Updates How many times have you thought "Do I really need to install this update?’" The answer is "Yes you do!" You should make sure that your computer – and your mobile devices – are switched “on” to automa... How to Review & Update Your Network Security Systems The type and nature of cyber threats evolve every day so it's important to regularly review & update the systems, policies and processes you have in place. What Does This Involve? Agree a timefram... Basic IT Security Controls Want a quick checklist of the very basic IT security controls your business should have in place? Well here it is. Install security software that includes a firewall, anti-virus and anti-spyware. Ens... Cyber Emergency Incident Checklist If a cyber security incident should occur, here's a helpful list of key questions you need to ask yourself that will help shape your response. These questions should help you respond to a cyber securi... Establish an Incident Management Plan An incident management plan outlines processes for your business to deal with a cyber security breach, including what constitutes a breach and who should be contacted if one occurs. Why is it importan... Promoting a Cyber Security Conscious Work Culture Employees play a vital role in helping to protect a business from cyber security threats. Yet, almost half of the worlds population with work smartphones, iPads or tablets don't protect them with a p... Cyber Security Policy - Why Every Business Should Have One A cyber security policy establishes the rules of engagement for protecting your business online. It includes simple security controls with regard to staff use of your network and the operation of devi... Social Media Privacy Settings Many of us are concerned about our online privacy, but have you checked the settings of your social media tools, or have you assumed the default settings are ok? We all know that what we upload to soc... Can You Identify a Secure Webpage? 44% of the people we asked could not! Secure webpages are extremely important. They create a safe connection between the website and the web browser so that entered data (like credit card details or... Can You Recognise a Phishing Email or Text? 23% of those we asked would not recognise and delete a phishing email immediately We've all received them - the email from a Nigerian Prince who needs to transfer $40 million but cannot use an African... Staying Safe in Google Search Typed a search term in Google and had explicit or inappropriate content displayed in your results? How do you stop it happening? We've probably all typed an innocent search term and come up with not s... Using Google Search — Be a Web Wizard Learn how to filter your search results, exclude explicit content and find the images that match your needs While Google search is quite intuitive, it is also packed full of features that most of us... How long does your information stay on the Internet? Forever - just because you can no longer find it using Google, doesn't mean it's not there. The Internet is forever. In some ways that can be great because it means you have access to information, e... Acceptable Use Policy An acceptable use policy outlines what an employee can and can't do when using IT equipment or when accessing the Internet. What is an acceptable use policy? An acceptable use policy outlines wha... Keeping Your Portable Devices Secure Portable digital devices such as laptops, tablets and smart phones have become ubiquitous for conducting business in today's mobile world. However, keeping them safe presents a significant challenge ... Android Security Guidelines Overview The information below will help you Avoiding COVID-19 cyberscams Overview This page provides tips for protecti Doxing and protection Overview Doxi What are the 5 C's of Cyber security? What Are The 5 Cs of Cybersecurity The 5 Cs of cybersecurity consist of The Human Factor: How Employee Behavior Affects Cybersecurity Summary The weakest link in an organization's cybersecurity defenses is often the people. This article examines the role of employee behavior in cybersecurity, detailing common mistakes, the impact of...