The field of cybersecurity has garnered significant attention, prompting many professionals from various industries and graduates to inquire about how they can enter this domain and explore the different career options it offers. To address these questions comprehensively, this blog series will be divided into two parts. In Part 1, we will delve into the... Continue Reading →
Password hygiene. How to create strong passwords and manage them?
Every time when you sign up to a new service online, you would have to create a password. As a security measure, every site will ask you to create a strong password which is hard to guess, mix of alphanumeric, special characters, at least one uppercase letter and with least character limitation. On top of... Continue Reading →
Installing unknown software? Read this before you proceed.
When you download software from trusted sources like Microsoft or Google you don't have to worry much about trustworthiness. But when you download software or any files from random sites or programs sent by friends, how do you verify them? When we download file or software from unknown sites, we can scan it with our... Continue Reading →
