Our Cyber world tech journalist, Paul specialises in Cyber Security having worked in the field for over 5 years and has previous Tech admin roles to his credit. Applying Cyber tech to office use and sharing Cyber related articles are what Paul offers us. He is very experienced and his contribution is invaluable.
Buying second-hand devices does have its advantages over buying new, but be prepared.
Automation, car hacks, and network worms will be some of the main cyber security threats next year, according to WatchGuard Technologies.
Over the last while we have all been spending less time coneecting to Wi-Fi hotspots at cafes, hotels, airports or company guest networks.
A proxy server – is a computer on the internet which acts as a middle-man between your computer and the website or service you’re using.
Her Majesty's Revenue and Customs (HMRC) is analysing more than 10,000 emails, SMS messages, social media posts and phone scams that use the Covid-19 pandemic as their theme, a new report from the Lanop Accountancy Group states.
The concept of trust arises out of human needs to live socially and rely on others to act cooperatively, and trust within the digital society is no different.
The fact that most vendors do not provide data protection alongside its other services, will come as a surprise to some.
You use long passphrases with letters and numbers. Well thought out passwords.
Be aware of top-clicked LinkedIn phishing emails include such subject lines as “You appeared in new searches this week!”, “Please add me to your Linkedin network”, and “Join my network on LinkedIn”.
The frequent use of personal devices among remote workers is placing organisations at risk of attack, a new report from cybersecurity and data analytics firm CybSafe claims.