15 Types of Common Cyber Attacks Series

15 Types of Common Cyber Attacks: What are they, how do they happen, and what you can do to mitigate your risk.

We've decided to start a 15 part series, inspired by an infographic shared by Dan Williams from CrowdStrike. Thanks Dan!

In this series, we will be explaining in real world terms how these hacks occur, giving some real-life examples, and advice on what you can do to mitigate your risk.

Look out for part 1/15: Man in the Middle (MITM) Attacks.

Below is an introduction video by our Founder and Leader, Martin (Marty) Haak.

Incident Response Plan: Why every organisation must have one

Incident Response Plan: Why every organisation must have one

Like we always say, EVERYTHING is hackable. It's not a matter of if, but when.

All businesses are at risk of Cybercrime. All businesses are at risk of a databreach. 89% of businesses worldwide experienced at least one Cybersecurity incident last year. $3.62 million is the average cost of a breach.

This is why Cybersecurity is everyone's responsibility. We may not be able to fully protect our businesses, however, we can do a lot to reduce our risk.

Read More

R.I.P. Windows 7

R.I.P. Windows 7

RIP Windows 7.

Two days ago was the final day of support for Windows 7.

What this means, is that Microsoft is no longer supporting Windows 7.

Without support, there are no more software or security updates being released.

On simple terms, if exploits are found in Windows 7 which a hacker or malware could exploit, your risk is huge.

Read More

Anatomy of an Attack - Inside the mind of a hacker

Have you every wondered what a hacker was thinking when they were planning and then executing their plan to take advantage of your business and information?

This video from Cisco while a couple years old, is still relevant too today’s world with business still being targeted. See what small steps a hacker can go through to get inside your business and turn your day for the worse.