Command & Control (C2) Explained

Join us this Friday at 12:00 PM EST LIVE! — Attackers use Command and Control (C2) servers to maintain persistence on a victim’s computer inside a target network. When a connection is established, the infected system sends a signal to the attacker’s server in search of…


0 Comments1 Minute

Easy Ways to Secure your WordPress Website from Hackers

Is your WordPress website hacked? Is It Secure enough? WordPress is getting hacked left, right and center! So it’s important to make your site secure. In this LIVE podcast, I show you practical ways you can go about protecting your WordPress site from hackers. I’ll go through…


0 Comments1 Minutes

You’ve Been Hacked!

Smaller businesses and startups may not have the luxury of an in-house cyber security team when something goes wrong. Being hacked not only means that your company’s data may end up in the wrong hands, but it may also result in a slew of operational, financial and customer trust…


0 Comments1 Minute

Cyber Security Whistleblowing

Companies deal with a lot of sensitive customer data today, so some businesses would prefer to keep it private when a breach occurs. However, secrecy in that area is typically unjust to customers, prompting whistleblowers to publicize incidents and bad security malpractices. The term…


0 Comments1 Minute

Are Deepfakes a Cyber Security Threat?

Deepfakes pose a cyber security risk to businesses by increasing the effectiveness of phishing and BEC attacks, making identity fraud more straightforward, and manipulating company reputations to cause an unjustified drop in share value. If left unchecked, deepfakes will become the next…


0 Comments1 Minute

Changing Human Behavior in Cyber Security

Live interview with Ragnar Sigurdsson, CISSP, CEH and Cyber Psychologist Dr. Maria Bada from AwareGO. Social engineering attacks are becoming more sophisticated as hackers utilize human psychology for crafting their campaigns. Yet, there is still the notion that cyber security awareness…


0 Comments1 Minute

The Last Selfie on Earth

AI-generated selfie photographs show what the last day on Earth may look like. They depict some quite horrific visions of how it all may end. All thanks to DALL-E 2, an artificial intelligence picture generator. But what about AI in cyber security? In this LIVE podcast, we flip AI on its…


0 Comments1 Minute

Small Business Cyber Security Top Tips

Digital theft of financial and personal information has surpassed physical theft as the most often reported type of fraud. A cyber security attack can have serious ramifications for small businesses. You risk losing vital corporate information, hurting your reputation, and worst of all,…


0 Comments1 Minutes

How to Protect Your Business from Ransomware Attacks

Small and medium-sized businesses are struggling to re-evaluate their cyber security posture. According to the ‘Cost of a Data Breach Report – 2021’ by IBM Security, the average total cost of a ransomware breach is $4.62M, while the average number of days to identify…


0 Comments1 Minutes

Ransomware-as-a-Service (RaaS) explained – Cyber Security

Ransomware attacks are rising, and technology isn’t making it any easier. Ransomware climbed by 40% to 199.7 million incidents in the third quarter of 2020. Attacks in the United States alone have risen by 139 percent yearly, totalling 145.2 million instances in Q3 2020. The…


0 Comments2 Minutes