3DES used to be one of the most prominent forms of encryption. It is based on the DES algorithm, but has since been superseded by AES in most use cases.
By Josh Lake
in Information Security
on August 31, 2023
Backing up the data on your server and keeping it in an easily-recoverable format is essential for any business. Find out the best server backup software on the market today.
By Stephen Cooper
in Net Admin
on February 22, 2024
Continuous testing is the best solution for checking on new code in a CI/CD environment.
By Stephen Cooper
in Net Admin
on October 2, 2024
Cross-site request forgeries are complex attacks that exploit predictable request parameters. They lead to state changes that can cause significant harm to victims.
By Josh Lake
in Information Security
on May 14, 2021
There are so many different messaging apps on offer, and the differences can be highly technical. Check out our guide for a simple rundown of which apps you should be using to keep your data secure and private.
By Josh Lake
in Information Security
on April 13, 2022
Huawei's involvement in 5G networks has gotten a host of media attention over the past few years, but most articles skate around the truth. Our deep dive tells you what's really going on.
By Josh Lake
in Information Security
on May 13, 2021
It's no secret that your mobile tracks you. A lot. We explain everything you need to know about how your mobile tracks you and how you can reduce this as much as possible.
By Josh Lake
in VPN & Privacy
on September 26, 2023
Employment applications can be a privacy nightmare. Thankfully, Employers must follow legal requirem
By Sam Cook
in Information Security
on April 15, 2022