Unlock a safer future: Swap your Google password for a cutting-edge passkey today 07/05/2023 – Posted in: Information Security

Time needed to read: 4 minutes Good news for those who detest passwords—Google is one step closer to being password-free as it has now made passkeys available to all individual account users. Google has unveiled a feature that permits you to log into your account from any device using a PIN or biometric, such as your face or fingerprint, rendering that pesky password obsolete. If you want to take advantage of this innovation, you can…

Continue reading

Internet Cookies: Friend or Foe? Why You Should Consider Clearing Your Browser History 26/04/2023 – Posted in: Information Security

Time to read: 8-10 minutes As an avid Internet user, I often browse different websites, search for information, and buy products online. Over the years, I have come to learn about internet cookies and the role they play in my online experience. While cookies have their benefits, they also have downsides, which is why it’s essential to consider clearing your browser history from time to time.  What are internet cookies, and how do they work?…

Continue reading

ISO 27001: Everything You Need to Know About Information Security Management 30/03/2023 – Posted in: Information Security

Time to read: 6 minutes ISO 27001 is an international standard that provides a framework for Information Security Management Systems (ISMS). The standard outlines a systematic approach to managing sensitive information so that it remains secure. In this blog post, we’ll discuss everything you need to know about ISO 27001 and how it can benefit your organization. What is ISO 27001? ISO 27001 is a widely recognized international standard that outlines the requirements for an…

Continue reading

Understanding IT Security Frameworks: An Introduction Guide – Posted in: Information Security

Time to read: 5 minutes In today’s digital age, cybersecurity has become a critical concern for organizations worldwide. With the increasing number of cyber threats, data breaches, and cyber-attacks, it is crucial for businesses to adopt an IT security framework that can help them protect their data and IT assets. In this blog post, we’ll discuss some of the popular IT security frameworks that organizations can adopt to improve their security posture. National Institute of…

Continue reading