How to protect your digital assets
Apr21

How to protect your digital assets

If you have something digital that needs protection, take a look at these tips

Read More
Should companies be forced to build encryption backdoors into services?
Mar30

Should companies be forced to build encryption backdoors into services?

The controversial debate over whether tech companies should implement backdoors that allow governments access to encrypted information on digital devices

Read More
Encryption Backdoors, Vault 7, and the Jurassic Park Rule of Internet Security
Mar12

Encryption Backdoors, Vault 7, and the Jurassic Park Rule of Internet Security

Surely without a hint of irony, just a day after WikiLeaks dumped a vault-load of documents detailing the Central Intelligence Agency’s

Read More
How to improve your computer security, as recommended by Edward Snowden
Mar03

How to improve your computer security, as recommended by Edward Snowden

Yahoo Inc. said on Wednesday its senior executives failed to “properly comprehend or investigate” a 2014 security breach…

Read More
Cyber Security: Top 7 Crisis Management Tips
Feb28

Cyber Security: Top 7 Crisis Management Tips

Unauthorised disclosure of personal information can arise from either accidental or deliberate actions of employees, hackers or disgruntled customers

Read More
One-third of US companies breached last year, consumers pay the price
Feb20

One-third of US companies breached last year, consumers pay the price

Paying exclusively with cash or avoiding internet retail isn’t enough – using an email account from a company like Yahoo can place personal information at risk.

Read More