A Content Delivery Network (CDN) is a system of forward proxy servers distributed across multiple locations. They are known as such because they are forward and closer to the users of websites (proxies). Secondly, they have copies of content from your actual servers — at least the static portion of […]
cybersecurity
In recent years, there have been many new developments. With each new development, new domains have emerged. Domains like digital marketing and cloud computing that didn’t exist previously are now mainstream. Accompanying some of these new developments are new regulations like personal data protection and personal privacy. Companies need to […]
Not many people are aware that all search engines maintain a blacklist of sites. These are websites, the search engines will do not display on their result pages. Why do they have such a blacklist of websites? For a search engine, good user experience is important. Protecting its users from […]
I have been asked many times by company bosses whether there is such a thing as a 100% cyber-secure environment. The simple answer is NO. There is no such thing as a 100% secure environment, especially when you are connected to the Internet. To have near 100% protection, you would […]
All companies will experience a cyber attack. Below are 7 reasons why. #1 Surfing dubious websites In today’s technology-driven world, web surfing is an everyday activity. No one in front of a device, be it a desktop, tablet, or mobile phone, would not be surfing a website. Cybercriminals know […]
An information security policy is a vital document to an organization. It serves as a baseline of what a company is doing to protect information within the organization. It also serves as a reference to employees on how they should handle information. The information security policy is gaining importance as […]
In the 80s, anyone who owns a computer would inadvertently hear of the term anti-virus. They would be asked whether they would want to purchase an anti-virus application to protect their computer. In the 2000s, a new term has emerged –malware. While computer salespeople today do not ask customers to […]
A phishing attack can happen any time. Imagine you are living in a village, and you, the village chieftain, hears of an impending attack. You would quickly summon the villagers and prepare them for the attack. If the village is attacked, property and lives will be lost. Today, companies are […]
Mixed content is a security issue. It is part of a Content Security Policy (CSP). For the longest time since the birth of the Internet, there was no requirement for websites to have the secure transport HTTPS protocol to display web content over browsers like Google Chrome. Traffic and data […]
Search engines are continually indexing the World Wide Web. They deploy efficient crawler programs to seek out webpages and index them for better search results. However, there are some sensitive pages on a website that we recommend site owners not allow search engines to index and display as it could […]