Knowlegde

Google: Here come 11 new security features across Gmail, Meet and Chat

0 comments

Google is one of the popular services adopted by NGOs. Therefore, making use of the security features in Google is important. Google…

Read More

Ransomware Evolved: Double Extortion and Fake Decryptor

0 comments

Ransomware is among the most detrimental and wide-spread cyber security threats. Hackers are using it to encrypt files on the user’s device…

Read More

Majority of firms concerned about public cloud security, most have suffered breach

0 comments
Cloud_security

According to Sophos’ State of Cloud Security 2020 study, 70% of public cloud enterprise users have experienced security vulnerabilities in the past…

Read More

The Symptoms of Ransomware Infection

0 comments
The Symptoms of Ransomware Infection

The article lists the signs for being infected with ransomware, includes missing files, system boot-up delay, application or system crash, and received…

Read More

Assessing the Security of Remote Access Services Guideline

0 comments

Remote access services enable workers of a company to access corporate IT services and their work files anytime, anywhere. When opting to…

Read More

Six Security Tips for Home Office

0 comments

With the recent outbreak of novel coronavirus infection, many companies in Hong Kong have arranged their staff to work from home to…

Read More

Beware of Attacks on Remote Access Services

0 comments

Rush to Remote Access Services Opens More Opportunities for Hackers As the COVID-19 pandemic continues its spread globally, many organisations are implementing…

Read More

Beware of Juice Jacking when Charging Mobile Phones at Public Charging Stations

0 comments

Many shopping malls, coffee shops and even public facilities nowadays are offering as part of enhanced customer services a complimentary charging station…

Read More

10 measures to secure Zoom Meetings

0 comments

Due to the global outbreak of COVID-19, many companies and education institutes have arranged staff and teachers to work or teach from…

Read More

Why abandoned domain names are so dangerous

0 comments

Abandoning the old domain name with will trigger information security issue. It is because attacker can re-register your domain name, set up an email server to receive your email or send…

Read More
1 5 6 7 8

ESSENTIAL