Facing the security challenges in a hybrid work environment. The events of 2020 have shown how resilient business could be when confronted with the ch...
Surviving a ransomware attack
We have seen a significant increase in Ransomware attacks over the past 24 months – and there looks to be no slowing down! These attacks can be deva...
Understanding Artificial Intelligence and its adoption into Wireless Networks
There is no shortage of information written on artificial intelligence (AI) and machine learning – in fact, the volume of information circulating at...
Surface Web, Deep Web, Dark Web
The Surface Web, Deep Web and Dark Web all make up what we know to be the Internet. The Surface Web is the area of the Internet that we are more famil...
The Cyber Kill Chain
Social engineering is the manipulation of someone to serve an objective such as divulging confidential information tThe Cyber Kill Chain framework dev...
Social Engineering
Social engineering is the manipulation of someone to serve an objective such as divulging confidential information that they would not normally divulg...
User and Privileged Authentication
User and privileged authentication continues to present as risks to most organisations. With most security audits that we have done at Seccom Global, ...