Category: Computer Tips

  • Phishing

    It may be surprising that many cyber security breaches do not result from technical failures. In fact, it is commonplace for attackers to exploit the goodwill and trust of people to gain access to systems, using a form of attack that is known as ‘social engineering’. Pretending to be technical support personnel or crafting emails…

  • Taking stock of your information assets

    Before you can take steps to protect your corner of cyberspace, you need to know what information you have that needs protection: your information assets. This will be your inventory template.  Compile a list, perhaps in a spreadsheet or using the template below, of the different types of information you store on your computer or online.…