Day Three – chugging along! Today’s challenge – Review Privacy Settings – Direct Link to Guide Page Most people are not aware how much data...
30DISC – Day 2 – Set Up A Standard User Account
Day Two – let’s crack on! Today’s challenge – Set Up A Standard User Account – Direct Link to Guide Page This was the one...
30DISC – Day 1 – Installing Operating System and Application Updates
Day One – here we go! Today’s challenge – Installing Operating System and Application Updates – Direct Link to Guide Page For most people this...
30DISC – Day 0
Welcome to the first day of the 30 Day Information Security Challenge. Strictly speaking, it will be a 31 Day Challenge because of our...
Practice what you preach!
Over the past twelve months I have become increasingly aware that most non-tech people have very little understanding of even the most basic information...
USB Drives – the biggest security threat to organisations today?
As you’ll note, the heading is a question. And it isn’t necessarily a rhetorical one. I’d be very happy for someone to offer a...
Spring in the air, porn in the workplace
‘Tis the season of love, and apparently for some, that includes stoking the embers whilst on the clock. Over the past two months we’ve...
What is Geospatial Searching. And why you should do it!
“Keywords are King.” This is the mantra of the online world. If you want to find something, or you want to be found, it...
Increasing the value of physical surveillance through social media targeting intelligence
One of the use cases we’ve been exploring with our clients has been employing targeting intelligence from social media to derive better value from...
What is pretexting? And why you don’t do it.
Pretexting is an art. Well, done correctly, it is an art. So what is it, and if it’s so good, why shouldn’t I do...