How to End the Culture of Silence in Cyber Security
August 18, 2022
Do you believe everyone in your company would speak out if they suspected phishing or a cyber-attack was imminent? Can you conduct difficult cyber security discussions with your board of directors or management team? Culture of Silence in Cyber Security is more significant than ever. When you add…
0 Comments11 Minutes
Website Hosting Provider | 7 questions before you buy.
August 17, 2022
If you are setting up an online presence for the first time, or if you are dissatisfied with your current service, you will need to choose a Website Hosting Provider first. There are several factors that you should consider to guarantee you receive the finest service available. Website Hosting…
0 Comments11 Minutes
The Last Selfie on Earth – Artificial Intelligence and Cyber Security
August 16, 2022
The Last Selfie on Earth | AI-generated selfie photographs show what the last day on Earth may look like. They depict some quite horrific visions of how it all may end. All thanks to DALL-E 2, an artificial intelligence picture generator. But what about AI in cyber security? The Last Selfie on…
0 Comments6 Minutes
This Ransomware Exploits RDP Weaknesses to Get Access to Networks
August 15, 2022
The new joint Cyber Security Advisory (CSA) of the FBI, Cyber Security Infrastructure Security Agency (CISA) and other law enforcement agencies warned that the MedusaLocker ransomware was primarily seen in May 2022 exploiting Remote Desktop Protocol (RDP) configurations to access victims’…
0 Comments4 Minutes
10 Cyber Security Tips and Resources for Small Business
August 11, 2022
Digital information theft has surpassed physical theft as the most commonly reported fraud. Businesses, regardless of their size, must have a cyber security plan in place to protect their own operations, their customers and their data from the growing cyber security threats. Cyber Security Tips…
0 Comments6 Minutes
A Day in the Life of a SOC Cyber Security Analyst
August 10, 2022
Security Analysts are essential members of Rhyno’s Security Operations Centre (SOC), serving as a virtual extension of our client’s in-house teams. SOC Analysts oversee and monitor a variety of detection systems in order to discover, investigate, and respond to threats around the…
0 Comments11 Minutes
CEO Fraud Attacks | 4 Most Common cases & how to Avoid Them
August 9, 2022
In today’s cyber environment, no one is safe, especially executives. CEO Fraud Attacks are becoming more widespread, with attackers routinely sending phishing emails to a company’s employees, impersonating the CEO in order to trick them into transferring money or revealing important…
0 Comments8 Minutes
Security Testing in Your Development QA – Three Reasons Why
August 8, 2022
A highly process-oriented Quality Assurance (QA) role in the Software Development Life Cycle (SDLC) produces the most effective software, application, or product. However, it is sometimes viewed as an afterthought to ensure that all parts of the product or application are in order before releasing…
0 Comments5 Minutes
Awareness vs Resilience | Closing the Cybersecurity Gap
July 28, 2022
Awareness vs Resilience | What makes a business cyber resilient? Hint: cyber awareness does not equate to cyber resilience. Check this out. Awareness vs Resilience | To close the gap, companies must shift from a reactive to a proactive approach when implementing cyber security. For example, a…
0 Comments9 Minutes
What You Need to Know About Website Backups
July 27, 2022
As a business owner, your website is the center of your brand. Therefore, it is vital that you back up your website. Every aspect of your website is the result of your decisions and ideas. There are several security precautions you should take, including: Scanning for viruses (AV) Security…
0 Comments10 Minutes