Knowlegde

Six Security Tips for Home Office

0 comments

With the recent outbreak of novel coronavirus infection, many companies in Hong Kong have arranged their staff to work from home to…

Read More

Beware of Attacks on Remote Access Services

0 comments

Rush to Remote Access Services Opens More Opportunities for Hackers As the COVID-19 pandemic continues its spread globally, many organisations are implementing…

Read More

Beware of Juice Jacking when Charging Mobile Phones at Public Charging Stations

0 comments

Many shopping malls, coffee shops and even public facilities nowadays are offering as part of enhanced customer services a complimentary charging station…

Read More

10 measures to secure Zoom Meetings

0 comments

Due to the global outbreak of COVID-19, many companies and education institutes have arranged staff and teachers to work or teach from…

Read More

Why abandoned domain names are so dangerous

0 comments

Abandoning the old domain name with will trigger information security issue. It is because attacker can re-register your domain name, set up an email server to receive your email or send…

Read More

Several Well-known Organisations Being Targeted By Maze Ransomware Operators – Data Leak!!

0 comments

Ransomware has evolved! Security researcher has found that ransomware not only encrypt files on the user’s device and demand payment in order…

Read More

What cyber security tools do small charities need?

0 comments

Small charities often lack the resources that can devote to cyber security, therefore they are potentially easy targets for cyber criminals. The below article provided…

Read More

Your Data, Their Devices: Accounting for Cybersecurity for Personal Computers

0 comments

The below article provides several essential security advice to prevent data loss while employee need to use their personal devices. The advice included…

Read More

Ten Cyber security Best Practices For Not-For-Profit Organizations

0 comments

Not-For-Profit Organizations have become a target for cyber criminals because they have collected lot of data and have fewer resources to implement…

Read More
1 6 7 8

ESSENTIAL