top of page
Search


Why Your Employees' Compromised Credentials Endanger Your Business
CIOs go to great lengths to ensure only authorized users access the network and then gain access only to the resources assigned to them. ...

Joseph Assaf Turner
May 5, 20202 min read


Cyber Security Awarenes
Why is employee awareness to the dangers of cyber security so important? Educating your employees on the dangers of cyber security...

Joseph Assaf Turner
Oct 10, 20181 min read


Global Cyber Attack Trends & Patterns
Rise of the Cryptominers One of the more prominent ransomware in these rankings is GlobeImposter, a variant of the Globe ransomware which...

Joseph Assaf Turner
Jul 30, 20181 min read


Global Cyber Risk Executive Perception
The ratio of intangible to tangible assets increased more than 5-fold in the past 40 years. Today, good information security means...

Joseph Assaf Turner
Jul 12, 20181 min read


10 Tips For Securing Your Windows System
When installing a new Windows machine or securing an existing one, be it a laptop, PC or server, there are important privacy and security...

Joseph Assaf Turner
Jul 5, 20181 min read


10 Biggest Data Breaches for 2018 ...yet
These are the biggest data breaches for the first half of 2018. In hindsight - all of these breaches could have been prevented by use of...

Joseph Assaf Turner
Jul 3, 20181 min read


Cyber Killchain
The cyber killchain is a Lockheed-Martin model of a cyber attack, showing the different stages a cyber attack goes through. Here is a...

Joseph Assaf Turner
Jun 21, 20181 min read


5 Security Steps for SMBs
The cost of a cyber attack to an SMB can be devastating Here are 5 steps you can take today!

Joseph Assaf Turner
Jun 20, 20181 min read


Fighting Malware - DiD Style
Since no single solution or technology is impervious to bypass or compromise, it is imperative that the company use multiple layers of...

Joseph Assaf Turner
Apr 26, 20181 min read


Cyber Threat Actors
5 types of cyber threat actors 1. Cyber Superpowers 2. State-Sponsored 3. Cyber Criminals 4. Hacktivist / Anarchist 5. Internal Error /...

Joseph Assaf Turner
Mar 27, 20181 min read
bottom of page