top of page
![Phishing Passwords Malware Social Engineering Data Breach Encryption Two-Factor Authentication Cyber Threats Internet Security Network Security Cyber Hygiene Cyber Attacks Identity Theft Insider Threats Cloud Security Cybersecurity Policies Cybersecurity Risk Management Incident Response Cybersecurity Awareness Cybersecurity Training.](https://static.wixstatic.com/media/af807c_9d7e6d5cce584b44bf3d7c6c9fe1f1f0~mv2.png/v1/fill/w_179,h_173,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/af807c_9d7e6d5cce584b44bf3d7c6c9fe1f1f0~mv2.png)
CYBERSECURITY AWARENESS COURSES
Search
![Identity Theft and How to Protect your Identity](https://static.wixstatic.com/media/af807c_addb4b63ff38452a928846353734eb26~mv2.png/v1/fill/w_318,h_159,fp_0.50_0.50,q_95,enc_auto/af807c_addb4b63ff38452a928846353734eb26~mv2.webp)
cyberstealth.co.uk
Aug 31, 20213 min read
Identity Theft and How to Protect your Identity
There is only one you right? You’re unique. No one else like you. But despite this obvious fact, more than 16 million Americans were...
20 views0 comments
![Cybersecurity – it is no longer just ‘an IT Problem’](https://static.wixstatic.com/media/af807c_69b8c521b62f4a32b80328bda0b06ecb~mv2.png/v1/fill/w_322,h_157,fp_0.50_0.50,q_95,enc_auto/af807c_69b8c521b62f4a32b80328bda0b06ecb~mv2.webp)
cyberstealth.co.uk
Aug 31, 20213 min read
Cybersecurity – it is no longer just ‘an IT Problem’
No business risk in the 21st century has created more challenges and concern to boardrooms and C-suites than cybersecurity risk. ...
9 views0 comments
![Saying too much on your Social Sites? Social Media Privacy and Security](https://static.wixstatic.com/media/af807c_cf6fa8dacd5848a3a189137f15bbe726~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/af807c_cf6fa8dacd5848a3a189137f15bbe726~mv2.webp)
cyberstealth.co.uk
Aug 31, 20214 min read
Saying too much on your Social Sites? Social Media Privacy and Security
Can you imagine a world without social media? No Snapchat, no Instagram, no Twitter, no Facebook! A world where children and adults woke...
9 views0 comments
![Geolocation | Yes, your devices tell us exactly where in the world you are](https://static.wixstatic.com/media/af807c_8899e0eba90048569cd3443ee63ac72f~mv2.png/v1/fill/w_345,h_146,fp_0.50_0.50,q_95,enc_auto/af807c_8899e0eba90048569cd3443ee63ac72f~mv2.webp)
cyberstealth.co.uk
Aug 31, 20214 min read
Geolocation | Yes, your devices tell us exactly where in the world you are
Have you ever wondered how the colossal entity that is the Internet – including apps, websites, companies and even private individuals –...
4 views0 comments
![Cloud Security | Securing your valuable data](https://static.wixstatic.com/media/af807c_7bf68d72b7d6430a970db122c80ed92d~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/af807c_7bf68d72b7d6430a970db122c80ed92d~mv2.webp)
cyberstealth.co.uk
Aug 31, 20215 min read
Cloud Security | Securing your valuable data
Cloud Security? How does one secure a cloud? With all the jargon, threats and ever-changing technology, securely tying down your digital...
3 views0 comments
![Data Protection Regulations – Understanding GDPR & POPI](https://static.wixstatic.com/media/af807c_9d7e6d5cce584b44bf3d7c6c9fe1f1f0~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/af807c_9d7e6d5cce584b44bf3d7c6c9fe1f1f0~mv2.webp)
cyberstealth.co.uk
Aug 31, 20215 min read
Data Protection Regulations – Understanding GDPR & POPI
Data Protection Regulations – Understanding GDPR & POPI We all know the intrusive feeling of those irritating and unwanted emails, texts...
7 views0 comments
![Destruction and disposal of sensitive data](https://static.wixstatic.com/media/af807c_f15e01abd17644cd8401e36e5ec119aa~mv2.png/v1/fill/w_311,h_162,fp_0.50_0.50,q_95,enc_auto/af807c_f15e01abd17644cd8401e36e5ec119aa~mv2.webp)
cyberstealth.co.uk
Aug 31, 20214 min read
Destruction and disposal of sensitive data
Nothing short of grinding your physically-stored data into granola dust for scrap-yard-hungry robots will do. Only physical drive...
11 views0 comments
![What is a SIM Swap Scam?](https://static.wixstatic.com/media/af807c_05b1b7d42d044c108926436510d0f24b~mv2.png/v1/fill/w_312,h_162,fp_0.50_0.50,q_95,enc_auto/af807c_05b1b7d42d044c108926436510d0f24b~mv2.webp)
cyberstealth.co.uk
Aug 31, 20213 min read
What is a SIM Swap Scam?
In June (2018) an 85-year-old South African pensioner had R300 000 – roughly USD $20 000, stolen from his bank account in a SIM swap...
8 views0 comments
![A brief history of computer viruses](https://static.wixstatic.com/media/af807c_d70fc48f66704f4c81257bcd7517bec8~mv2.png/v1/fill/w_284,h_177,fp_0.50_0.50,q_95,enc_auto/af807c_d70fc48f66704f4c81257bcd7517bec8~mv2.webp)
cyberstealth.co.uk
Aug 31, 20217 min read
A brief history of computer viruses
We all know the feeling; a sore throat, sneezing, congestion, a cough, a runny nose…oh no, the dreaded cold virus! No human is immune....
20 views0 comments
![Online Sextortion – the blackmailer in your inbox!](https://static.wixstatic.com/media/af807c_73af6f15312944e8a4362c1411c0348e~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/af807c_73af6f15312944e8a4362c1411c0348e~mv2.webp)
cyberstealth.co.uk
Aug 31, 20217 min read
Online Sextortion – the blackmailer in your inbox!
Blackmail has been around for as long as shame – since the very moment criminals first discovered the value we hold in keeping that shame...
13 views0 comments
![Watering hole attacks – what are they and how to prevent them?](https://static.wixstatic.com/media/af807c_e3fc6dd71194474aa2bf02ce906c8a02~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/af807c_e3fc6dd71194474aa2bf02ce906c8a02~mv2.webp)
cyberstealth.co.uk
Aug 31, 20214 min read
Watering hole attacks – what are they and how to prevent them?
A watering hole is a waterhole from which animals regularly drink, right? True. Or a pub, bar or restaurant – any place where people...
19 views0 comments
![Blockchain Security Benefits](https://static.wixstatic.com/media/af807c_9685a5fa102846c6ad81e7473efa5099~mv2.png/v1/fill/w_318,h_159,fp_0.50_0.50,q_95,enc_auto/af807c_9685a5fa102846c6ad81e7473efa5099~mv2.webp)
cyberstealth.co.uk
Aug 31, 20215 min read
Blockchain Security Benefits
In building, a wall made of 500 connected, overlapping small concrete blocks with steel is stronger than a wall made of one, large...
6 views0 comments
![Cryptojacking – the rising crime of mining digital currency](https://static.wixstatic.com/media/af807c_a74af773b42e4033a40f89e44581c236~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/af807c_a74af773b42e4033a40f89e44581c236~mv2.webp)
cyberstealth.co.uk
Aug 31, 20215 min read
Cryptojacking – the rising crime of mining digital currency
To jack somebody (for something) is to steal something from somebody, especially something small or of low value. Being jacked isn’t...
6 views0 comments
![Facebook and fencing yours in](https://static.wixstatic.com/media/af807c_bbd9f1c351064473b9d6f7e4fdf2906f~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/af807c_bbd9f1c351064473b9d6f7e4fdf2906f~mv2.webp)
cyberstealth.co.uk
Aug 31, 202110 min read
Facebook and fencing yours in
It’s safe to say Facebook isn’t safe. (Thursday 21 March 2019) Facebook announced yet another data breach – the third in a year (we know...
5 views0 comments
![Access Control in the digital world](https://static.wixstatic.com/media/af807c_0caeae8e50514bffb268b814e68d6713~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/af807c_0caeae8e50514bffb268b814e68d6713~mv2.webp)
cyberstealth.co.uk
Aug 31, 20213 min read
Access Control in the digital world
We all want to feel safe. We all want to feel secure. We all want to know that the things we value are safe and secure. Safety and...
8 views0 comments
![The Internet of Things | Allowing more ‘things’ to think and act for us!](https://static.wixstatic.com/media/af807c_4020fe5795294570a1074313fa88607f~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/af807c_4020fe5795294570a1074313fa88607f~mv2.webp)
cyberstealth.co.uk
Aug 30, 20214 min read
The Internet of Things | Allowing more ‘things’ to think and act for us!
Have you ever wondered about all this talk of “things” being “smart”? “Smart” phones and “smart” cars, “smart” homes and “smart” bars…...
10 views0 comments
![Ransomware – To pay or not to pay?](https://static.wixstatic.com/media/af807c_ec66339c54654f6db30e6b5c5b536b55~mv2.png/v1/fill/w_454,h_288,fp_0.50_0.50,q_95,enc_auto/af807c_ec66339c54654f6db30e6b5c5b536b55~mv2.webp)
cyberstealth.co.uk
Aug 30, 20216 min read
Ransomware – To pay or not to pay?
In its simplistic form, ransomware is a type of malicious software designed to block access to a computer system or computer files until...
9 views0 comments
![Online Gaming and Cyber Crime – are you playing, or being played?](https://static.wixstatic.com/media/af807c_8f300f22f9eb4c15b41db6b31cd0146b~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/af807c_8f300f22f9eb4c15b41db6b31cd0146b~mv2.webp)
cyberstealth.co.uk
Aug 30, 20213 min read
Online Gaming and Cyber Crime – are you playing, or being played?
When it comes to games – especially online gaming, it’s one thing to play, but it’s altogether something else to be played! Three...
9 views0 comments
![Cameras and Microphones | Are you being watched?](https://static.wixstatic.com/media/af807c_bceac2a9546a455480162e3197a38ead~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/af807c_bceac2a9546a455480162e3197a38ead~mv2.webp)
cyberstealth.co.uk
Aug 30, 20215 min read
Cameras and Microphones | Are you being watched?
Are we being spied on via our cameras and microphones on our personal devices? Built-in device cameras and microphones are great. They...
33 views0 comments
![COVID-19 outbreak: How to avoid cyber criminals taking advantage](https://static.wixstatic.com/media/af807c_469a76b9947b4b6ab96c1fb875dbc374~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/af807c_469a76b9947b4b6ab96c1fb875dbc374~mv2.webp)
cyberstealth.co.uk
Aug 30, 20213 min read
COVID-19 outbreak: How to avoid cyber criminals taking advantage
We have been overrun these past few months with everything Coronavirus, COVID-19-related, and with it, a near-constant stream of...
7 views0 comments
bottom of page