Blog
Privasec is now a Sekuro Company
- Category
All
Compliance & Standards
Cybersecurity Basics
Event & News
Incident Response & Tabletop Exercises
Our Cybersecurity Solutions
Vulnerability Assessment & Penetration Testing
How using Safari can get you Hacked
Dropbox has recently revealed three critical vulnerabilities in the Apple MacOS operating system, which could allow a hacker to execute a malicious code by convincing the victim to visit the malicious web page.
ISACA COBIT framework
The importance of Information and Technology Governance cannot be overstated. With companies trying to maximise the value derived from IT assets while managing the associated risks, the need for a structured approach to designing and implementing enterprise governance for IT is key.
Daily Backups
One of the most overlooked ACSC Essential Eight strategies in mitigating cybersecurity incidents is daily backups. Think of it as your absolute fail-safe in a scenario when all other security controls have failed. But what are the steps and strategies involved in backing up your data?