Keeping systems patched is one of the challenges for most of the NGOs. There is an example to show what would results…
Most of the leaks come from outside the organization, and cyber attacks against small and medium-sized enterprises (SMB) are still ongoing. Some…
Since many NGOs would outsource their website and web application development to the vendor and WordPress is one of the popular tools…
In the last few months, Work from home is a new model for NGOs. This article reminds us that VPN, which many…
Ransomware is among the most detrimental and wide-spread cyber security threats. Hackers are using it to encrypt files on the user’s device…
The article lists the signs for being infected with ransomware, includes missing files, system boot-up delay, application or system crash, and received…
Rush to Remote Access Services Opens More Opportunities for Hackers As the COVID-19 pandemic continues its spread globally, many organisations are implementing…
Many shopping malls, coffee shops and even public facilities nowadays are offering as part of enhanced customer services a complimentary charging station…
Abandoning the old domain name with will trigger information security issue. It is because attacker can re-register your domain name, set up an email server to receive your email or send…
Ransomware has evolved! Security researcher has found that ransomware not only encrypt files on the user’s device and demand payment in order…