GoSafeOnline

Filter By:
The Risky Business of Outdated Technology
Spending money on IT solutions can be a costly outlay for small and medium enterprises (SMEs), ...
The Risky Business of Outdated Technology
Implementing BYOD in the Workplace Securely
With more companies realising the benefits of allowing their employees to use their personal ...
Implementing BYOD in the Workplace Securely
Top Tips for Cybersecurity at Work
Companies are only as strong as their weakest link when it comes to cybersecurity.
Top Tips for Cybersecurity at Work
Next Wave of Ransomware Attacks - Are You Prepared
It's not a matter of “if” but “when” it will happen again.
Next Wave of Ransomware Attacks - Are You Prepared
Distributed Denial of Service Attack
The number of distributed denial-of-service (DDoS) attacks is growing, and it is a key cause of ...
Distributed Denial of Service Attack
Watch Your Backyard - Data Exfiltration
Organisations these days have to be prepared for various types of cyber-attacks, from sophisticated ...
Watch Your Backyard - Data Exfiltration
Cyber Tip - Spot Signs Of Phishing
Be vigilant and learn to spot signs of phishing
Cyber Tip - Spot Signs Of Phishing
Better Cyber Safe Than Sorry
Check out our new “Better Cyber Safe than Sorry” awareness campaign
Better Cyber Safe Than Sorry
Cyber Tip - Use An Anti-Virus Software
Use anti-virus software to prevent malware infections
Cyber Tip - Use An Anti-Virus Software
Cyber Tip - Update Your Software Promptly
Patch your software promptly
Cyber Tip - Update Your Software Promptly
You’ve been hacked. What’s your response plan?
Is your organisation prepared for a cyber-security incident? Hacking and other forms of ...
You’ve been hacked. What’s your response plan?
OpenSSL Heartbleed Bug
OpenSSL is an open-sourced tool kit that implements the Secure Sockets Layer (SSL) and Transport ...
OpenSSL Heartbleed Bug
Dealing with a Cyber Security Incident
There is no silver bullet in cyber security. There is always a possibility for your devices, such as ...
Dealing with a Cyber Security Incident
Advanced Persistent Threats - Types of Associated Attacks
Advanced Persistent Threat – What is it?Advanced persistent threat (APT) usually refers to a ...
Advanced Persistent Threats - Types of Associated Attacks
Denial of Service
Denial of Service (DoS) attack refers to the attempt to prevent the availability of ...
Denial of Service
How to Securely Access Corporate Resources Remotely
The provision of remote access services to employees and business partners to access corporate ...
How to Securely Access Corporate Resources Remotely
Metadata - Usage and Security Concerns
Metadata is data that describes another piece of data. Metadata can be found in almost every ...
Metadata - Usage and Security Concerns
Catch the "Phish"
“Congratulations!”Have you ever come across emails or social media posts with such ...
Catch the "Phish"
Guide to Securing Web Presence for Businesses
Preventive MeasuresOnce your organisation decides to have a web presence (such as having a website), ...
Guide to Securing Web Presence for Businesses
Destroying Sensitive Information How Enterprises Can Do It Safely and Securely
In the corporate world, infocomm technologies are widely used; files are stored, sent and retrieved ...
Destroying Sensitive Information How Enterprises Can Do It Safely and Securely