Category: Informative Blogs

Informative Blogs

How has remote work affected the cybersecurity industry?

ost countries are beginning to come out of the pandemic we can look back and see the real impact that it had on society. One of the big changes that everyone had to get accustomed to as being part of the remote workforce. When it comes to cyberattacks Some people like working from home because of the freedom it gives you and the time that it saves on commuting. But on the other hand, many people struggled to work from home. According to Forbes, 45% of people that worked from home said they felt that they were less mentally healthy while working from home. 97% of people said that vacation days were important for recharging even though they were working from home, which in theory should be more relaxing than going to work.

Read More »
Informative Blogs

How to secure your cryptocurrency wallet

have made a lot of money through bitcoin, many people have lost a lot of money on bitcoin as well and it’s not always because of the price going down. Did you know 20% of all bitcoin has been lost due to users forgetting their passwords to their bitcoin wallets? Unlike fiat currency which could be replaced, there’s a good chance that these bitcoins will never be returned to the marketplace. If you hold your bitcoin through an exchange this may not be a concern for you but if you are someone that deals with bitcoin wallets directly this is something you should be mindful of.

Read More »
Informative Blogs

Hackers and NFTs

NFT stands for non-fungible token and it’s a unit of data stored in a blockchain that certifies that a digital file is unique. For comparison let’s look at another popular technology that uses the blockchain, like bitcoin. Bitcoin is fungible, this simply means that no single bitcoin is distinctly different from the next, the only difference is who owns that bitcoin. However, every NFT is unique. Non-fungible simply means that they cannot be substituted for one another because they are one of a kind. 

Read More »
Informative Blogs

New OWASP top 10 vulnerabilities

OWASP stands for the open web application security project and it’s an online project that creates free content on securing web applications. One of their most famous projects is the OWASP top 10, which is a list of the top 10 web applications vulnerabilities. Recently OWASP has done a revamp of the OWASP top 10.

Read More »
Informative Blogs

Anti-Fraud – Phishing Scams & how to protect yourself

Phishing attacks continue to be one of the most popular and efficient types of social engineering attacks used to cause data breaches. It’s estimated that 3 billion phishing emails are sent every day in 2021. Phishing emails take advantage of a person’s trust to gain access into the corporate network and it’s extremely difficult to stop because it is typically delivered through email, which must be enabled for business to take place. However, there are many mitigations that you can put in place to reduce the likelihood of users seeing these emails and limit the damage that may be done if they do see the email.

Read More »
Informative Blogs

Zero Trust Model Explained

before giving them access to company resources. The zero-trust model as the name suggests means that you shouldn’t implicitly trust anyone, regardless of where the request is coming from. This means inside the network, outside the network, or coming from a trusted network you should still have processes in place that require a user to authenticate before giving them access to a company resource. This way regardless of where an attack is coming from, they won’t be able to bypass the security mechanisms that you have in place.

Read More »
Informative Blogs

Security Flaws in video game code

Just like any other software application video games are a collection of code and they can be vulnerable to exploitation like any other piece of software. Over three-quarters of applications (75.8%) have at least one security flaw, 24.7% have a severe security flaw and about 60% of applications have at least one vulnerability found on the OWASP top 10 vulnerabilities.

Read More »
Informative Blogs

How parents can protect their kids while gaming on xbox

Xbox one is one of the two big video consoles, it’s a clear battle between Xbox and PlayStation for the number 1 console on the market. Now if your child is one of the millions of people that use Xbox then you should be aware of the different parental controls that you have to make sure that your child isn’t exposed to bad influences or taken advantage of by people that they run into online.

Read More »
Informative Blogs

How parents can protect their kids while gaming on playstation

Playstation is one of the two big video consoles, it’s a clear battle between Xbox and PlayStation for the number 1 console on the market. Now if your child is one of the millions of people that use PlayStation then you should be aware of the different parental controls that you have to make sure that your child isn’t exposed to bad influences or taken advantage of by people that they run into online. This article will highlight the best parental controls on PlayStation. Please keep in mind to use all of these features you need to create a child account on the console.

Read More »
Informative Blogs

People of colour in cybersecurity

eople of colour have been underrepresented in many high profit industries, especially when it comes to management positions for many years. Now, in the last decade or so there has been a huge push for equal pay and representation in the workplace and this has had a major impact on the opportunities for people of colour in industries like cybersecurity and others. In this article we’re going to highlight some of the statistics on people of colour in cybersecurity in the last few years.

Read More »
Informative Blogs

Free Security Tools: Oppos Cybersecurity Health Grade

Oppos Cybersecurity health tool is a free resource for evaluating where your company stands when it comes to cybersecurity. It’s a simple 12 step questionnaire that looks at different elements of your company’s cybersecurity program including policy, procedures, tech and network configuration. This tool was created based on the experience of our consultants as well as outside standards by the government and important compliance regulations like GDPR, HIPAA and PIPEDA to give you an accurate assessment of your business .

Read More »
Informative Blogs

Free Security Tools: Oppos email breach check

Getoppos has officially launched 4 new free security tools on our website. These tools are open source and help make the community safer for everyone. The first tool we are featuring is called the oppos email breach check. This tool allows you to check if any of your personal information has been exposed in a past data breach. When companies suffer a data breach, millions of passwords can be leaked overnight.

Read More »

Stay Connected! Subscribe now to our newsletter.