top of page
SecuSolutions Blog
Cybersecurity Month? – What About the Other Eleven?!
October is here, that time when additional attention is brought to the importance of cybersecurity. For some companies, it’s the time to reaffirm their commitment to the plans they already have in place or the strategies they intend on launching to further the defense against cyber-attack. For other companies, cybersecurity month might be the trigger to assess their exposure to cyber-attack and to put a plan in place. For whatever reason, thinking about cybersecurity and the
jimkootnekoff
3 min read
Password Protection – The Truth Behind the Characters
Have you ever wondered; how strong your passwords really are? Are eight characters enough, or should you use twelve? The answer is neither, is necessarily the “right” answer. This is due to password cracking. Password cracking is a method of attack where cybercriminals attempt to “crack” or steal passwords from their victims, and it is very effective. But first, let us backtrack a little bit, and define what a password is. Passwords are secret data, usually in a form of a str
Jules Aquino
4 min read
Cybersecurity - The Cost of Procrastination
Did you know, your procrastination could cost you more than security would? The price tag for indecision, is very costly, yet many remain complacent when it comes to security. Over the past 21 years, working in the IT security sector, we have heard every excuse in the book about the reasons why security budgets get pushed to the bottom of the boardroom agenda. The reasons are many, such as management trusting that the “IT guy” is taking care of security because he or she told
jimkootnekoff
3 min read
Cybersecurity Services: Responsive or Responsible?
Nobody can deny that the business of cybersecurity has become one of the hottest and in-demand segments in the IT marketplace. It is clear that the criminal element can conduct their activities globally with ease and little chance of apprehension. In a rapidly growing and evolving digital revolution the future is likely to accelerate risks and threats. More and more of our daily corporate and personal lives are going to rely on embedded and Internet of Things (IOT) devices to
George Rafael
4 min read
bottom of page

