crystal

  • Home
  • Author: crystal
  • Page 2
cybersecurity

Your Biggest Cybersecurity Risk: Your Employees

Cybercriminals work round the clock to detect and exploit vulnerabilities in your business’ network for nefarious gains. The only way to counter these hackers is by deploying a robust cybersecurity posture that’s built using comprehensive security solutions. However, while you’re caught up doing this, there is a possibility you may…
Read More
NATIONAL CLEAN YOUR VIRTUAL DESKTOP DAY

National Clean Your Virtual Desktop Day

On the third week of October, on October 17 this year, people celebrate National Clean Your Virtual Desktop Day by doing just that. Making sure their desktops are cleaned. I will show you exactly how to  do that and why it is important… National Clean Your Virtual Desktop Day Activities…
Read More
security tips for public Wi-Fi users

Top 7 Public Wi-Fi Users Security Tips

No longer a luxury, free Internet access anytime and anywhere has rapidly become commonplace. We seek out hotspots wherever we spend more than a minute: in the subway, in cafés, in public buildings. But the price of such convenience is the risk of running into cybercriminals. Here’s how to strike…
Read More
How can your company be damaged by cybercrime?

How Can Your Company Be Damaged By Cybercrime?

Reputational Damages What’s worse than a data breach? Trying to cover it up. Companies have learnt this lesson the hard way, after clients discover the trusted company has been hacked and exposed to cybercrime. News like this travels fast on social media and soon you will be trending. With Dark…
Read More
IT Security

Top-Down Approach To IT Security

For any organization, its employees are its biggest assets. But, what happens when your biggest assets turn out to be your greatest threats or liabilities? That is how cybercrime can change the game. In a recent study, it came to light that employee actions account for about 70% of the…
Read More
Password Mistakes To Avoid

Eight Common Password Mistakes To Avoid

Research points out that more 80% of data breaches happen due to password hacking, meaning that poor password hygiene is responsible for a majority of cybercrimes that follow data breaches. To make sense of this statistic better, let’s first look at what constitutes poor password hygiene. Using simple passwords Often…
Read More
Email Security

Are Your Emails Protected Against Cyber Attack? – Email Security

Block incoming threats with proven multi-layered protection, before someone clicks and lets them in. Multiple layers of machine learning-powered email security, including multi-factor heuristics, sandboxing and reputation system for emails and attachments combine to provide reliable protection against even the most complex mail-based attacks. Stopping these attacks before they can…
Read More

Contact Information

KMA Centre, 7th Floor, Nairobi
(+254) 111180000 / 020 440 4074
Mon - Fri: 8am - 5pm