top of page

CYBERSECURITY AWARENESS COURSES
Search


Identity Theft and How to Protect your Identity
There is only one you right? You’re unique. No one else like you. But despite this obvious fact, more than 16 million Americans were...

cyberstealth.co.uk
Aug 31, 20213 min read
20 views
0 comments


Cybersecurity – it is no longer just ‘an IT Problem’
No business risk in the 21st century has created more challenges and concern to boardrooms and C-suites than cybersecurity risk. ...

cyberstealth.co.uk
Aug 31, 20213 min read
9 views
0 comments


Saying too much on your Social Sites? Social Media Privacy and Security
Can you imagine a world without social media? No Snapchat, no Instagram, no Twitter, no Facebook! A world where children and adults woke...

cyberstealth.co.uk
Aug 31, 20214 min read
9 views
0 comments


Geolocation | Yes, your devices tell us exactly where in the world you are
Have you ever wondered how the colossal entity that is the Internet – including apps, websites, companies and even private individuals –...

cyberstealth.co.uk
Aug 31, 20214 min read
4 views
0 comments


Cloud Security | Securing your valuable data
Cloud Security? How does one secure a cloud? With all the jargon, threats and ever-changing technology, securely tying down your digital...

cyberstealth.co.uk
Aug 31, 20215 min read
3 views
0 comments


Data Protection Regulations – Understanding GDPR & POPI
Data Protection Regulations – Understanding GDPR & POPI We all know the intrusive feeling of those irritating and unwanted emails, texts...

cyberstealth.co.uk
Aug 31, 20215 min read
7 views
0 comments


Destruction and disposal of sensitive data
Nothing short of grinding your physically-stored data into granola dust for scrap-yard-hungry robots will do. Only physical drive...

cyberstealth.co.uk
Aug 31, 20214 min read
12 views
0 comments


What is a SIM Swap Scam?
In June (2018) an 85-year-old South African pensioner had R300 000 – roughly USD $20 000, stolen from his bank account in a SIM swap...

cyberstealth.co.uk
Aug 31, 20213 min read
8 views
0 comments


A brief history of computer viruses
We all know the feeling; a sore throat, sneezing, congestion, a cough, a runny nose…oh no, the dreaded cold virus! No human is immune....

cyberstealth.co.uk
Aug 31, 20217 min read
20 views
0 comments


Online Sextortion – the blackmailer in your inbox!
Blackmail has been around for as long as shame – since the very moment criminals first discovered the value we hold in keeping that shame...

cyberstealth.co.uk
Aug 31, 20217 min read
13 views
0 comments


Watering hole attacks – what are they and how to prevent them?
A watering hole is a waterhole from which animals regularly drink, right? True. Or a pub, bar or restaurant – any place where people...

cyberstealth.co.uk
Aug 31, 20214 min read
19 views
0 comments


Blockchain Security Benefits
In building, a wall made of 500 connected, overlapping small concrete blocks with steel is stronger than a wall made of one, large...

cyberstealth.co.uk
Aug 31, 20215 min read
6 views
0 comments
bottom of page