What is Penetration Testing?

What is Penetration Testing? Penetration testing is a security evaluation executed exactly as a real attacker would. System vulnerabilities are discovered and exploits are launched trying to obtain unauthorized access. The objective is to inform the organization of the security issues that could result by not having the necessary security measures. By Craig Ford – […]

Cybersecurity and the Accountancy Industry

You wanted to know: What are the Main Cybersecurity Problems in Accountancy? All industries have cybersecurity risks that are common between them like patching issues, keeping customer data private and keeping the external-facing parts of their systems hardened and secure. At the very least, every industry needs to uphold these basic standards, otherwise they are […]

Cybersecurity and the Manufacturing Industry

You wanted to know: What are the Main Cybersecurity Problems in Manufacturing? Cybersecurity in manufacturing has several challenges that we need to consider and resolve if we are to make a significant impact on the security landscape. In many manufacturing facilities, two separate networks exist – Information Technology and Operational Technology. By Davichi Cyber Security […]

Is the Cloud risky?

Silver cloulds next to computer monitors

What are the Main Risks of Cloud Computing? The biggest risk of cloud computing is just that – the fact that it is cloud computing. The cloud has some great benefits but there are misconceptions about what the cloud actually is. To many, the cloud is an intangible place where wizards conjure invincible systems out […]

What is Social Engineering?

Managed IT Services

What is Social Engineering? Social engineering is a method of manipulation of a target for the purposes of getting the target to act in a certain way. It can be something small and simple or as big as transferring $50K to some newly modified account details that the malicious actor convinced you to change for […]

What is Two-Factor Authentication?

A cloud with up and down arrows in a hexagon

What is Two-Factor Authentication? Is it really that important? The majority of services and systems that we use on a day-to-day basis only require a username and password for access. These act as a digital key that allows a user to identify themselves in the system and access sensitive information. With security breaches, digital crime, […]

What to do if you think you have been hacked…

What to do if you think you have been hacked… What To Do Next? This is not a simple answer to give but its something that we get asked all of the time, so here are some basic tips to keep in mind. To best explain we will go through a couple of scenarios that may […]

Speed up tabbed browsing with OneTab

By Davichi Marketing Speed up tabbed browsing with OneTab For those users who like to have many tabs open at the same time, you know that it can be very taxing on your RAM, thus slowing down their computer. However, there is a utility called OneTab that can reduce the RAM usage of these extra tabs by up to […]

Are Phone Payment Methods Secure?

You Wanted to Know… Are Smartphone Payment Methods as Secure as Credit Cards? Mobile phone payment methods are something that is starting to become a mainstream ability not just a novelty ability for the early tech adopters. Mobile phone payment methods have become mainstream and are no longer just a novelty for the early tech […]

Is antivirus enough?

Red circle security alert symbol with exlamation mark

It has become clear of late that many don’t see the urgency or need for cyber insurance or simply don’t understand what it really is for.