Security

check-your-widows-firewall-protect-your-online-security

Check your Windows Firewall: protect yourself and your information from hackers.

It might be important to mention from this point that the Windows default firewall may not be adequate enough to protect your computer from intrusion or anomaly. There is usually a need to combine this with other security solutions such as a reliable anti-virus and/or a host-based intrusion detection system. Going straight to the point, […]

Check your Windows Firewall: protect yourself and your information from hackers. Read More »

impact_of_excessive_social_media_on_mental_health_and_safety

Tips on Using social media more healthily {Part 2: Unhealthy use of Social Media}

We believe you have read part 1 of this article and have seen some of the unhealthy ways we use social media and some negative implications of this. If you have not read the Part 1 of Unhealthy use of social media, we recommend you do so as this is a summary of the 2 previous posts on the

Tips on Using social media more healthily {Part 2: Unhealthy use of Social Media} Read More »

impact_of_excessive_social_media_on_mental_health_and_safety

Unhealthy Use of Social Media {Part 1 Cont’d – Negative Implications}

This is a continuation of Unhealthy Use of Social Media and its negative implications. Click here to read the previous part of this article. Let’s dive right in. 5- Information about your family/personal life: did you know you can put your family also at risk by posting on your own social media? Yes, you can! However,

Unhealthy Use of Social Media {Part 1 Cont’d – Negative Implications} Read More »

common_security_attacks_and_what_osi_layer_they_operate_cyber_security_protect_your_network_from_hackers2

Common Security Attacks and the OSI Layer They Operate

Layer 5 Session Hijacking: When users browse the internet, the web server sends a token to each user’s browser to identify the connection from each user. In a session hijacking attack, an attacker steals a valid session token to gain unauthorised access to a web server. Methods used by attackers to achieve this include a

Common Security Attacks and the OSI Layer They Operate Read More »