Category: Tips

Protect data when crossing borders

Protect Your Data When Crossing Borders

Anyone who has travelled to the United States will know how seriously border security is taken. In recent years, Customs & Border Protection (CBP) agents have been increasingly searching travellers’...

How to make email secure

7 Tips To Keep Your Email Account Secure

Most people send emails every day. Therefore, protecting your email account is a must. Especially when you know that emails are the favourite way for hackers to access your data....

How to avoid bad password haits

Top 5 Bad Password Habits

Less than 1 second : that’s how long it will take for a fairly savvy hacker to crack the password “qazwsxedc”. So, more than ever, you need to avoid bad password...

How to protect your data

12 Tips On How To Protect Your Data

Since the start of the Covid-19 pandemic, the number of cyber attacks on organizations and individuals has exploded. It is therefore more important than ever to keep your data and...

Password security best practices

11 Password Best Practices To Keep Your Accounts Secure

How well do you remember your passwords? If you’re like most people, you probably keep forgetting passwords. You might be guilty of reusing the same password on different accounts, or...

what is vishing

Social Engineering: What is Vishing?

Vishing is a combination of “voice” and “phishing”. It refers to phishing scams done over the phone. Individuals are tricked into revealing critical financial or personal information during seemingly trustworthy...

what is smishing

Social Engineering: What is Smishing?

Smishing is a social engineering attack using phishing techniques, but sent by text message instead of email. The name is a combination of SMS and phishing. In this post, you’ll...

Whaling social engineering

Social Engineering: What is Whaling ?

A whaling attack is a social engineering technique involving scam emails imitating senior individual messages to target high-ranking executives. As such, it’s a form of executive phishing, like spear phishing....