Search Results (9) Social Media Privacy Settings Many of us are concerned about our online privacy, but have you checked the settings of your social media tools, or have you assumed the default settings are ok? We all know that what we upload to soc... How long does your information stay on the Internet? Forever - just because you can no longer find it using Google, doesn't mean it's not there. The Internet is forever. In some ways that can be great because it means you have access to information, e... Cyber Emergency Incident Checklist If a cyber security incident should occur, here's a helpful list of key questions you need to ask yourself that will help shape your response. These questions should help you respond to a cyber securi... What is Internet of Things (IoT)? The Internet of Things (IoT) comprises a network of physical devices. Essentially, any device that connects to either the Internet or a local network can be considered as part of IoT. Here are some ot... Can You Identify a Secure Webpage? 44% of the people we asked could not! Secure webpages are extremely important. They create a safe connection between the website and the web browser so that entered data (like credit card details or... Android Security Guidelines Overview The information below will help you Doxing and protection Overview Doxi Cyber Security Principles Terms & Definitions Adequate Security - Security commensurate with the risk and the magnitude of harm resulting from the lo Establish an Incident Management Plan An incident management plan outlines processes for your business to deal with a cyber security breach, including what constitutes a breach and who should be contacted if one occurs. Why is it importan...