top of page
Cybersecurity Posts
Search
Jun 16, 20202 min read
Why Backups Are Important
When was the last time you made copies of all your important data; your contacts, your emails, documents, images, files that were a...
18 views0 comments
May 19, 20203 min read
How to Spot Phishing Scams
*Security Note: None of the links in this post direct to other websites. The links have been replaced with www.cyberprotection.com for...
16 views0 comments
Apr 14, 20202 min read
How to protect against ransomware
What is ransomware? Ransomware is a type of malware that limits or prevents users from accessing their systems. This type of software...
18 views0 comments
Jan 28, 20192 min read
What are hacker script kiddies
In order to understand the term script kiddies, one must first be introduced to the topic of hacker ethics. Sounds like a paradox? Well,...
66 views0 comments
Jan 24, 20193 min read
Top 5 things to teach kids about cybersecurity
In recent years, there has been a lot of debate on what children should be taught in schools. A couple of years back, United Kingdom...
23 views0 comments
Jan 24, 20192 min read
The Top 3 Things to do to Protect Against Cyber-criminals
However dark and dangerous the world of cyber-threats may seem, there are definitely steps you can take to reduce your chances of being a...
18 views0 comments
Jan 11, 20193 min read
Top 5 cyber scams and how to spot and avoid them
We can all agree that the Internet certainly is a magical place: it enables us to have quick access to all kinds of information, to...
14 views0 comments
Jan 9, 20193 min read
Protection in the home: How to set your Firewall
A firewall is a software that is installed on personal computers or small network servers when shared Internet connection is used. Its...
14 views0 comments
Dec 17, 20183 min read
Common cyber threats to a home computer and how to protect against them
Since the beginning of Internet, home computers have been under constant threat and these circumstances show no trend of decreasing. On...
18 views0 comments
Feb 6, 20182 min read
How Cyber-criminals use Social Media
Big social networks such as Facebook, Twitter, Instagram or LinkedIn are often targeted by cyber-criminals. These attacks are executed in...
11 views0 comments
bottom of page