The two most important ways to defend against security threats

An average of 5,000 to 7,000 new computer security threats are announced each year. That’s as many as 19 every day. The rate at which new threats appear make it difficult to decide which ones require your attention. It might surprise you that, while your competitors waste money on high-tech, expensive, and sometimes exotic defenses, you can get far more value by concentrating on just two things you already do.

Cyber Security Trends

Surveys and studies are beginning to produce similar disparate results, the two sides of the Atlantic have vastly diverse understandings of what it means to be cyber-safe. Not only that, but right here at home, your cyber security awareness is heavily affected by your age group, as are your computer skills, although not necessarily in the same direction.

Cyber Security and cyber knowledge, unfortunately do not come hand in hand and just because you are online 24/7, it doesn’t equate to being safer. 

UK Residents More Cyber Security Savvy Than Americans

Apple may have taken too big a bite.

A Genuine Explanation?

When the news first surfaced, following the discovery published on a tech blog, Apple came out to confirm these findings. However, the company explained that they were reducing performances of older iPhones allegedly with the intention of preserving these older models, to compensate for the battery degradation and denied any underhand intentions.

Cyber Security, Digital marketing and the Evolving market.

Although we would argue that there is still a vital need for direct marketing and cold calling, traditional no-frills cold calling is waning in effectiveness, with most consumers, be they millennials or simply under 50 years old, giving cold calling little or none of their time.

Not only that but although most of us still have one of those cute telephones that sit in our living rooms attached to the wall, we don't use them anywhere near as much as we used to.


Not really, it's actually a little bit creepy and now that the existence of web-tracking and similar methods companies use to keep your digital footprints in stored data has been completely and publicly revealed, some of us are even a little peeved.

CyberHub Academy’s 5 Holiday Cyber Security Tips.

1. Protect the human factor

As hectic as the end of the year is for everyone involved in a business, there are certain security measures that should not be ignored or overlooked. You should establish rules and practices with your employees on how to handle and protect customer information and other vital data.

2. Update your passwords

Paypal and Cyber Vulnerabilities

The global e-commerce platform PayPal disclosed a data breach that may have compromised roughly 1.6 million customer accounts.

Be honest folks, you’ve been scared to go into cryptocurrency for the fear of those massive breaches of ICOs, wallets, and personal accounts. You never worried too much about PayPal, well, that time is over.

Turns out, the breach may not be as bad as it looks, or maybe that’s just what PayPal wants us to believe.

Who's watching you?

Unfortunately, Apple users, it's happening right now. This week a brilliant researcher by the name Felix Krause discovered an alarming vulnerability in Apple software which beggars' belief and knocks our faith in our best friends, our phones.

The funny thing is that it’s not really a vulnerability - it’s an actual feature!

Time to Panic? Potential Wi-Fi Security Breach Uncovered

Biggest Internet Security Threat Ever?

Details of the latest vulnerability discovered in the WPA2 protocol have until this point not been shared with the public. The breach was discovered by the group of researchers who developed KRACK, pointedly spelled with a K and an acronym for Key Reinstallation Attacks.

Cyber Security Best Business practices

Outlined here are 10 cybersecurity practices we believe that you should be incorporating for your Business IT safety, immediately:

  1. It all starts at home – Educate your Staff

Your workers, are unfortunately, the thorn in the side of IT security practices. You must mitigate the level of risk. Basic training must include password protection skills, recognition of phishing scams, simple malware applications and company privacy policies.