top of page

CYBERSECURITY AWARENESS COURSES
Search


Identity Theft and How to Protect your Identity
There is only one you right? You’re unique. No one else like you. But despite this obvious fact, more than 16 million Americans were...

cyberstealth.co.uk
Aug 31, 20213 min read
20 views
0 comments


Cybersecurity – it is no longer just ‘an IT Problem’
No business risk in the 21st century has created more challenges and concern to boardrooms and C-suites than cybersecurity risk. ...

cyberstealth.co.uk
Aug 31, 20213 min read
9 views
0 comments


Saying too much on your Social Sites? Social Media Privacy and Security
Can you imagine a world without social media? No Snapchat, no Instagram, no Twitter, no Facebook! A world where children and adults woke...

cyberstealth.co.uk
Aug 31, 20214 min read
9 views
0 comments


Cloud Security | Securing your valuable data
Cloud Security? How does one secure a cloud? With all the jargon, threats and ever-changing technology, securely tying down your digital...

cyberstealth.co.uk
Aug 31, 20215 min read
3 views
0 comments


Data Protection Regulations – Understanding GDPR & POPI
Data Protection Regulations – Understanding GDPR & POPI We all know the intrusive feeling of those irritating and unwanted emails, texts...

cyberstealth.co.uk
Aug 31, 20215 min read
7 views
0 comments


Destruction and disposal of sensitive data
Nothing short of grinding your physically-stored data into granola dust for scrap-yard-hungry robots will do. Only physical drive...

cyberstealth.co.uk
Aug 31, 20214 min read
12 views
0 comments


What is a SIM Swap Scam?
In June (2018) an 85-year-old South African pensioner had R300 000 – roughly USD $20 000, stolen from his bank account in a SIM swap...

cyberstealth.co.uk
Aug 31, 20213 min read
8 views
0 comments


A brief history of computer viruses
We all know the feeling; a sore throat, sneezing, congestion, a cough, a runny nose…oh no, the dreaded cold virus! No human is immune....

cyberstealth.co.uk
Aug 31, 20217 min read
20 views
0 comments


Online Sextortion – the blackmailer in your inbox!
Blackmail has been around for as long as shame – since the very moment criminals first discovered the value we hold in keeping that shame...

cyberstealth.co.uk
Aug 31, 20217 min read
13 views
0 comments


Watering hole attacks – what are they and how to prevent them?
A watering hole is a waterhole from which animals regularly drink, right? True. Or a pub, bar or restaurant – any place where people...

cyberstealth.co.uk
Aug 31, 20214 min read
19 views
0 comments


Blockchain Security Benefits
In building, a wall made of 500 connected, overlapping small concrete blocks with steel is stronger than a wall made of one, large...

cyberstealth.co.uk
Aug 31, 20215 min read
6 views
0 comments


Cryptojacking – the rising crime of mining digital currency
To jack somebody (for something) is to steal something from somebody, especially something small or of low value. Being jacked isn’t...

cyberstealth.co.uk
Aug 31, 20215 min read
6 views
0 comments


Facebook and fencing yours in
It’s safe to say Facebook isn’t safe. (Thursday 21 March 2019) Facebook announced yet another data breach – the third in a year (we know...

cyberstealth.co.uk
Aug 31, 202110 min read
5 views
0 comments


Access Control in the digital world
We all want to feel safe. We all want to feel secure. We all want to know that the things we value are safe and secure. Safety and...

cyberstealth.co.uk
Aug 31, 20213 min read
8 views
0 comments


The Internet of Things | Allowing more ‘things’ to think and act for us!
Have you ever wondered about all this talk of “things” being “smart”? “Smart” phones and “smart” cars, “smart” homes and “smart” bars…...

cyberstealth.co.uk
Aug 30, 20214 min read
10 views
0 comments


Ransomware – To pay or not to pay?
In its simplistic form, ransomware is a type of malicious software designed to block access to a computer system or computer files until...

cyberstealth.co.uk
Aug 30, 20216 min read
9 views
0 comments


Online Gaming and Cyber Crime – are you playing, or being played?
When it comes to games – especially online gaming, it’s one thing to play, but it’s altogether something else to be played! Three...

cyberstealth.co.uk
Aug 30, 20213 min read
9 views
0 comments


Cameras and Microphones | Are you being watched?
Are we being spied on via our cameras and microphones on our personal devices? Built-in device cameras and microphones are great. They...

cyberstealth.co.uk
Aug 30, 20215 min read
33 views
0 comments


COVID-19 outbreak: How to avoid cyber criminals taking advantage
We have been overrun these past few months with everything Coronavirus, COVID-19-related, and with it, a near-constant stream of...

cyberstealth.co.uk
Aug 30, 20213 min read
7 views
0 comments


Remote Access Fraud
Imagine falling victim to Remote Access Fraud… You wake up one morning to find you’ve lost some money. Not the loose change your children...

cyberstealth.co.uk
Aug 30, 20213 min read
4 views
0 comments
bottom of page