Securing Your Data in the Cloud

Protect Your Digital Assets: Cloud Security Essentials

The use of cloud technology has become a vital aspect of modern business operations, providing organizations with the ability to store, share, and access data from anywhere. However, with this convenience comes the risk of data breaches and cyber-attacks. To protect personal and business data in the cloud, it’s essential to implement robust security measures. One of the key best practices

Read More
Signing professionally

To thine own self be true; Signing professionally using nSignBasic

In William Shakespeare’s Hamlet, Act 1 Scene 3, Polonius gave his son Laertes the advice ‘This above all: to thine own self be true,’. This is advice we all can get behind, however when signing documents today your personal identity would typically get mixed up with your professional identity. What are some options available to sign documents solely, in your professional

Read More
Approaching Zero Trust

Approaching Zero Trust

Traditional security models, for example, Defence-in-depth security architectures have generally prioritized protecting the network perimeter. However, many of today’s breaches come from within enterprises, and these strategies are failing them. Zero trust is a strategic approach to cybersecurity by eliminating implicit trust and continuously validating every state of digital interaction. Zero Trust’s goal is to reduce the danger of cyberattacks in

Read More
How TLS SSL Keeps Your Data Safe Data Encryption

How TLS/SSL Keeps Your Data Safe!

Generally, people don’t think much about how their data is transmitted across the internet but if you’re responsible for keeping sensitive information safe, it’s important to understand how TLS/SSL works and its importance. TLS (Transport Layer Security) and SSL (Secure Sockets Layer) are protocols that provide security for communication over networks such as the internet. They use a combination of public

Read More
Secure SSL Encryption HTTPS Certificate

Benefits and Implications of Reduced SSL Certificate Lifespan

The world’s most popular security protocol, SSL/TLS, is a critical part of any organization’s digital strategy. However, since 1 September 2020, Apple started reducing SSL/TLS validity to just 398 days (one year, plus roughly one month to facilitate renewals). This decision was then followed by both Google and Mozilla. These web browser makers believed in the benefits of reduced SSL Certificate

Read More
Tracking and Securing Assets in Organisation

Challenges in Tracking & Securing Assets in an Organization

An asset is defined in general dictionaries as something useful or valuable. The task of any organization is to ensure that the existing IT assets meet the said criteria above. It is undeniable that any component of an organization’s IT environment has a lifecycle, be it on the software or hardware level. Before we can even start to track this specific

Read More
Secure Code Cybersecurity

How to Secure Code

Given the ubiquitous nature of information technology, anyone can pick up a computer, watch a tutorial, and start coding. This individual may then hone their skills via formal education or informal means such as boot camps and short courses, and eventually go on to create a career out of the skills they acquired. And despite having spent hours upon hours honing

Read More
Cyber Disaster Cyber Security CyberSecurity SecurityBreaches Hackers

Preventing Cyber Disaster from Occurring in Your Organisation

I was planning to write my opinions about the breach on Optus when I read about the news that Telstra was under attack as well. In case you are unaware of what has happened, in late September 2022, Optus released a statement that it was “investigating the possible unauthorised access of current and former customers’ information”. It has been further revealed

Read More
Vulnerability Management

Understanding the Importance of Vulnerability Management

In the ever-changing market for cybersecurity today, organizations rely on numerous software solutions and applications which are either developed in-house or from other IT service providers to remain on the top of the curve. While these options help improve the efficiency of the system as well as experiences for both employees and customers, it is also prone to vulnerabilities that can

Read More