Advice

  • All
  • Safety Tips

Application Hardening

Be sure to configure your applications to block or disable any unnecessary or required features. For example, it is recommended to configure web browsers to …

Read More →

Microsoft Office Macro

It’s important that your system settings are set to block Microsoft Office macros from the internet, only allowing trusted macros with limited write access and …

Read More →

Daily backups

It’s important to run daily backups on any new and important data, when you change any software and configuration settings and retain these for at …

Read More →

Patching

Ensure to patch operating systems and applications regularly and within 48 hours of any known exploit or vulnerability being discovered. Security vulnerabilities can be used …

Read More →

Restricting privileges

Ensure to use the principle of least privilege and restrict the use of admin privileges. It is imperative to ensure the practice of limiting access …

Read More →

Multi-factor authentication

Establish the use of MFA when accessing emails, applications and VPNs and other remote sessions for all users. Stronger authentication methods make it harder for …

Read More →

Application whitelisting

Ensure to utilise the whitelisting of known safe and trusted applications to prevent the execution of unapproved and malicious programs. This will ensure that non-approved …

Read More →

Stay up to date

Stay up to date with the latest cyber news and incidents.