Blog

Privasec is now a Sekuro Company

All

Compliance & Standards

Cybersecurity Basics

Event & News

Incident Response & Tabletop Exercises

Our Cybersecurity Solutions

Vulnerability Assessment & Penetration Testing

Blog

How using Safari can get you Hacked

Dropbox has recently revealed three critical vulnerabilities in the Apple MacOS operating system, which could allow a hacker to execute a malicious code by convincing the victim to visit the malicious web page.

Read More »
Blog

ISACA COBIT framework

The importance of Information and Technology Governance cannot be overstated. With companies trying to maximise the value derived from IT assets while managing the associated risks, the need for a structured approach to designing and implementing enterprise governance for IT is key.

Read More »
Blog

Daily Backups

One of the most overlooked ACSC Essential Eight strategies in mitigating cybersecurity incidents is daily backups. Think of it as your absolute fail-safe in a scenario when all other security controls have failed. But what are the steps and strategies involved in backing up your data?

Read More »

Already know what you are after?

Get a quick quote from our consultants.

Scroll to Top