The unique properties of encryption, hashing and salting are vital for keeping our online world secure. In this article, we'll look at each of them in depth in order to understand what these processes are and how they are used.
By Josh Lake
in Information Security
on January 24, 2024
While developing your business continuity plan, you need to consider IT recovery procedures. Read about how to create a network disaster recovery plan.
By Ben Schultz
in Net Admin
on February 8, 2024
Your AWS account is secure but maybe the applications you install on your AWS server space might have vulnerabilities. Find out how to test them.
By Stephen Cooper
in Net Admin
on March 25, 2024
Want an extra layer of security as you browse the internet or unblock content? You need a Virtual Private Network (VPN). We reveal the best VPNs for Microsoft Edge and explain how to get set up.
By Ian Garland
in VPN & Privacy
on August 24, 2024
MD5 is a cryptographic hash function that is no longer considered safe for many purposes. Find out why and what to use instead.
By Josh Lake
in Information Security
on December 28, 2023
Public key cryptography allows people who have never met to exchange encrypted emails and files. Thi
By Jon Watson
in VPN & Privacy
on October 19, 2018
Norton vs. Avast - which one should you choose? We've compiled a detailed comparison of these two leading antivirus products to help you make an informed decision.
By Steve Adams
in Antivirus
on June 8, 2024
What is the Secure Socket Layer? Why is it a leading standard? We take a close look at SSL and every
By Sam Cook
in Information Security
on May 28, 2020
A chief privacy officer is a senior role that requires both cyber security and legal knowledge. We cover all the key aspects of the position, including job responsibilities, how to get hired, salary expectations, and the top companies hiring.
By Sam Woolfe
in Information Security
on March 22, 2021