Cybersecurity

A Password-Free Environment

Google, Microsoft and Apple have announced plans for a new technology to replace passwords – a passwordless future. The standard is being developed by the FIDO Alliance, together with the World Wide Web Consortium (W3C), which basically defines how the modern internet looks and works. This is quite a serious attempt to abandon passwords in […]
Read More
Data Buckup

4 Data Backup Myths You Need to Know About

According to research humans generate 2.5 quintillion bytes of data every day. That is a substantial amount of information. However, failing to keep up with the ever-changing threat landscape might wipe your share of this data in the blink of an eye. In fact, ransomware has more than doubled in frequency since last year, accounting […]
Read More
cybersecurity

Your Biggest Cybersecurity Risk: Your Employees

Cybercriminals work round the clock to detect and exploit vulnerabilities in your business’ network for nefarious gains. The only way to counter these hackers is by deploying a robust cybersecurity posture that’s built using comprehensive security solutions. However, while you’re caught up doing this, there is a possibility you may overlook mitigating the weakest link […]
Read More
security tips for public Wi-Fi users

Top 7 Public Wi-Fi Users Security Tips

No longer a luxury, free Internet access anytime and anywhere has rapidly become commonplace. We seek out hotspots wherever we spend more than a minute: in the subway, in cafés, in public buildings. But the price of such convenience is the risk of running into cybercriminals. Here’s how to strike the right balance between comfort […]
Read More
How can your company be damaged by cybercrime?

How Can Your Company Be Damaged By Cybercrime?

Reputational Damages What’s worse than a data breach? Trying to cover it up. Companies have learnt this lesson the hard way, after clients discover the trusted company has been hacked and exposed to cybercrime. News like this travels fast on social media and soon you will be trending. With Dark Web monitoring and forensics tools, […]
Read More
IT Security

Top-Down Approach To IT Security

For any organization, its employees are its biggest assets. But, what happens when your biggest assets turn out to be your greatest threats or liabilities? That is how cybercrime can change the game. In a recent study, it came to light that employee actions account for about 70% of the data breaches that happen. This […]
Read More
Password Mistakes To Avoid

Eight Common Password Mistakes To Avoid

Research points out that more 80% of data breaches happen due to password hacking, meaning that poor password hygiene is responsible for a majority of cybercrimes that follow data breaches. To make sense of this statistic better, let’s first look at what constitutes poor password hygiene. Using simple passwords Often passwords that are easy-to-remember are […]
Read More
Email Security

Are Your Emails Protected Against Cyber Attack? – Email Security

Block incoming threats with proven multi-layered protection, before someone clicks and lets them in. Multiple layers of machine learning-powered email security, including multi-factor heuristics, sandboxing and reputation system for emails and attachments combine to provide reliable protection against even the most complex mail-based attacks. Stopping these attacks before they can exploit your users’ naivety or […]
Read More

Contact Information

IPS Building 10th Floor, Kimathi Street
(+254) 111180000 / 020 440 4074
Mon - Fri: 8am - 5pm