Cyber Security

The OSINT Framework: Unveiling the Art of Information Gathering

In today’s digital world, information is abundant and readily accessible. However, the challenge lies in effectively gathering and analyzing relevant information to make informed decisions. This is where Open Source Intelligence (OSINT), comes into play. OSINT refers to the collection and analysis of information from publicly available sources to gain insights and intelligence. It encompasses …

The OSINT Framework: Unveiling the Art of Information Gathering Read More »

Protect Yourself from Juice Jacking: Tips and Tricks You Need to Know

With the increasing reliance on mobile devices, it is not uncommon for people to run out of battery on their phones or tablet when they are out and about. While charging stations have become a common sight in public places such as airports, cafes, and train stations, using them to charge your device comes with …

Protect Yourself from Juice Jacking: Tips and Tricks You Need to Know Read More »

Password Security Measures ii

It is a known fact that we rely heavily on passwords to secure our online accounts in today’s digital world. However, the use of weak passwords or password reuse across multiple accounts makes us vulnerable to cyberattacks. That is why it is essential to regularly perform password exposure tests (PET) to identify weak or compromised …

Password Security Measures ii Read More »

What is a Reverse Proxy?

A reverse proxy is a type of proxy server that sits between a client (web browser) and a web server and acts as an intermediary for requests that are made by the client. Unlike a forward proxy, which is used to protect clients by hiding their identities from servers, a reverse proxy is used to …

What is a Reverse Proxy? Read More »

Password Security Measures

Passwords have been around since the dawn of the computer age and they remain the primary means of protecting online accounts and personal information. As the number of online transactions and data breaches continue to increase, it is more important than ever to choose and use strong passwords. A strong password is a combination of …

Password Security Measures Read More »

The People, Process, and Technology of Cybersecurity

The COVID-19 pandemic generated an increase in cyber threats. According to a security magazine, Ransomware attacks rose by 92.7% in 2021 whilst comparison to 2020. With an increase in the use of digital technology comes an increase in cyber threats and with each passing day, such threats are evolving, and the need for constant attention …

The People, Process, and Technology of Cybersecurity Read More »

What is Cybersecurity Risk?

According to NIST SP 800-60 volume 1 revision 1, Cybersecurity risks relate to the loss of confidentiality, integrity, or availability of information, data, or information (or control) systems and reflect the potential adverse impacts on organizational operations (i.e., mission, functions, image, or reputation) and assets, individuals, other organizations, and the Nation. Cybersecurity risk is the probability of exposure, …

What is Cybersecurity Risk? Read More »