HOW TO STAY SAFE WHEN USING PUBLIC WI-FI

May 8, 2019

Most people tend to work from remote, public locations a few times a week. If you’re akin to hanging out at your local Starbucks and prepping your sermon, you could be risking a data breach without really knowing it. One of the most common ways that hackers can access your data is through a ‘man in the middle’ attack. The hacker finds a security flaw in the cafe or shopping center’s router, and exploits it to access the data that passes between you and the hub. To reduce the chances of getting ‘man-in-the-middled’, you need to check whether the public network you want to use is secured or unsecured before you join it. A quarter of all public Wi-Fi hotspots are entirely unencrypted. So, only use networks that require a log-in and password.

Spotlight

Security PS

Security PS is an information security consulting firm that helps businesses take on security challenges with confidence by addressing both immediate and long term needs. Our vendor independence, depth of experience, and commitment to proven best practices are leveraged on every engagement to bring the greatest value to our client's initiatives. Our services range from strategic to tactical, including: information security management program development, compliance, comprehensive security assessments, penetration testing, secure SDLC services, training, and more.

Other Infographics
news image

Cyber attack infographic

Infographic | December 25, 2019

Are businesses today doing enough to succeed in the battle against cyber security threats and are the traditional methods they are using the most effective?

Read More
news image

Artificial Intelligence in Cybersecurity

Infographic | April 4, 2022

Artificial intelligence endeavours to simulate human intelligence. It has immense potential in cybersecurity.

Read More
news image

Cybersecurity: main and emerging threats in 2021

Infographic | January 27, 2022

The progress of digital transformation has inevitably led to new cybersecurity threats. Cybercriminals take advantage of the Covid-19 pandemic, in particular by targeting organisations and companies working remotely. Parliament has adopted its position on a new EU directive that reflects how cybersecurity threats have evolved and introduces harmonised measures across the EU, including on the protection of essential sectors.

Read More
news image

Cybersecurity Best Practices Every Enterprise Should Follow in 2020

Infographic | February 11, 2020

Lack of awareness in protecting customer’s sensitive data can lead to severe repercussions. Therefore, enterprises should be able to predict potential cybersecurity risks and invest more in building strategies against hackers. But then, those strategies don’t have to be complicated. In fact, simplifying your approach towards cybersecurity (or cybercriminals at large) can go a long way.Not sure if you are maintaining the right cyber hygiene for your business and your customers? Here are a few tips by industry leaders that could help.

Read More
news image

The Importance of Database Security

Infographic | February 3, 2022

Security is everyone’s responsibility. Enabling business, protecting data, and managing risks are critical to literally every business. Maintaining database security is important to safeguard highly confidential and sensitive data. Between January and September 2020, about 36 billion pieces of data were compromised. In 2021, data breach costs increased from USD 3.86 million to USD 4.24 million.

Read More
news image

List of Cyber Attacks May 2021

Infographic | June 11, 2021

Do you know what is the most problematic element of cyber security? Yes, it is the constantly evolving nature of cyber attacks. A cyber attack refers to an attack executed from a computer against a computer system or individual computer that compromises the confidentiality, integrity, or availability (CIA) of the information stored on it.

Read More

Spotlight

Security PS

Security PS is an information security consulting firm that helps businesses take on security challenges with confidence by addressing both immediate and long term needs. Our vendor independence, depth of experience, and commitment to proven best practices are leveraged on every engagement to bring the greatest value to our client's initiatives. Our services range from strategic to tactical, including: information security management program development, compliance, comprehensive security assessments, penetration testing, secure SDLC services, training, and more.

Events