When you choose a piece of software or a cloud service, you rely on the competence of its supplier. You should implement vendor risk management to reduce your exposure.
By Stephen Cooper
in Data Privacy Management
on April 11, 2024
We take a look at the top VPNs for Indonesia based on speed, security and privacy features and the ability to unlock international content and streaming services from anywhere.
By Osman Husain
in VPN & Privacy
on April 26, 2024
VPNs are meant to hide your original IP address. But in certain circumstances, your IP address may be leaking. This post looks at how IP leaks occur and what you can do about them.
By Marc Dahan
in VPN & Privacy
on September 28, 2023
Having trouble deciding which VPN to use? To help, we’ve done a thorough comparison of two leading providers, CyberGhost and Surfshark. Read on to see exactly what each has to offer, and which is best.
By Ian Garland
in VPN & Privacy
on January 22, 2024
Looking to get a VPN but not sure which to choose? We put two of the most popular providers (Surfshark and VyprVPN) to the test; read on to find out what features they offer, how secure they are, and ultimately, which is best for the average user.
By Ian Garland
in VPN & Privacy
on October 16, 2023
Find out which antivirus program will best protect your PC and other devices from dangerous malware threats - TotalAV or Avast?
By Steve Adams
in Antivirus
on May 15, 2024
Spear phishing can be the cause of huge financial losses, both for individuals and businesses. We explain exactly what a spear phishing attack is (with examples) and the best practices to avoid becoming a victim.
By Aimee O'Driscoll
in Information Security
on October 19, 2020
Do you want to work in a senior level cyber security position? If so, you might want to consider the career path of a chief information security officer. This highly responsible role carries a lot of benefits, which we explore in this article.
By Sam Woolfe
in Information Security
on February 9, 2021
PGP encryption is useful for securing everything from emails to hard drives. But what exactly is it, and how does it work? We find out.
By Josh Lake
in Information Security
on November 16, 2023