Information Security
Email scams continue to be common, but most of them are easy to avoid if you're aware of them. We'll list some of the most common scams and discuss the steps you can take to avoid getting caught out.
By Jon Watson in Information Security on June 20, 2023
Employment applications can be a privacy nightmare. Thankfully, Employers must follow legal requirem
By Sam Cook in Information Security on April 15, 2022
Disabling Flash is a common step in securing a computer because Flash is so insecure. There have bee
By Jon Watson in Information Security on August 22, 2018
Credit card fraud is big business both online and offline. This article provides information on how
By Jon Watson in Information Security on September 11, 2018
How to comply with the GDPR. An overview of the rules, requirements, processes, and exemptions you n
By Lee Munson in Information Security on March 31, 2021
Wannacry might just be the wake-up call your business needs to put a plan in place to avoid ransomwa
By Lee Munson in Information Security on July 20, 2020
Encryption should be a part of your email strategy. This article explains how to use Hushmail to enc
By Jon Watson in Information Security on May 15, 2017
Want to know about the Caesar cipher? Or how the Enigma machine works? Find out in this comprehensive article on history's most famous codes and ciphers.
By Jon Watson in Information Security on August 30, 2023
Older people are more at risk of identity theft and often seen as easy targets. We look at the why s
Page 41 of 46