Latest Posts
Software Failures and Cyber Security
Increased cloud adoption and cyber security
Cyber Security risks of a Bring Your Own Device (BYOD) policy
Shadow IT and Cyber Security
Developing a data encryption strategy
  • Twitter
Skip to content
  • Home
  • Blog Archive
  • About TechDecoded
  • Contact Us
TechDecoded

Cyber Security through Cyber Education

  • Home
  • Blog Archive
  • About TechDecoded
  • Contact Us
Software

Software Failures and Cyber Security

27 December 2020
Cloud

Increased cloud adoption and cyber security

Bring Your Own Device (BYOD)

Cyber Security risks of a Bring Your Own Device (BYOD) policy

Shadow IT

Shadow IT and Cyber Security

Data

Developing a data encryption strategy

Software Failures and Cyber Security

Increased cloud adoption and cyber security

Cyber Security risks of a Bring Your Own Device (BYOD) policy

Shadow IT and Cyber Security

Developing a data encryption strategy

Emerging cyber security challenges with legacy systems

Remote learning and cyber security risks for the education sector

Covid-19 and the rise of RDP attacks

Coronavirus and working from home

Malware Obfuscation

Latest Posts

Software
27 December 2020

Software Failures and Cyber Security

Software failures are often a result of later additions to existing code…

Cloud
10 October 2020

Increased cloud adoption and cyber security

Cloud configuration is a specialised process that requires training and knowledge. A…

Bring Your Own Device (BYOD)
12 September 2020

Cyber Security risks of a Bring Your Own Device (BYOD) policy

As the IT industry evolved and the usage of technology proliferated, the…

Popular Posts

Cybersecurity
21 January 2019

Best cyber security practices

Making use of the best cyber security practices ensures protection of personal data. Several cyber security mechanisms can be utilised collectively for enhanced safeguarding of any computer system. TechDecoded has…

Cyber threats are location based Cybercrime
11 February 2018

Cyber threats that are location-based

An emerging trend among cybercriminals is to target victims based on their geo location. Cybercrime is now a global problem affecting individuals, organisations and governments thus cybercriminals are benefiting by…

What is Identity Fraud? Cybercrime
22 September 2017

What is Identity Theft?

Identity theft is a prevalent problem where cybercriminals are using digital means to steal personal data relating to victims. Nevertheless, identity theft is a complex form of cyber fraud which…

Best ways to defend against Ransomware Cybersecurity
29 August 2017

Best ways to defend against Ransomware

The possibility of falling victim to a Ransomware attack is highly likely for individual computer and Internet users around the globe. Defending against Ransomware is a requisite for which application…

Tips for protection against cyber threats Cybersecurity
31 July 2017

Tips for protection against cyber threats

Increased cyber threats from malware, ransomware, trojans, viruses and other forms of cybercrime have proliferated apprehension among many Internet users. A reason for the uneasiness among cyber users is that…

Digital Steganography Threats Cybercrime
19 June 2017

Digital Steganography Threats

Steganography is defined as the process of concealing messages or information. In other words, a message is hidden through the proficient use of art or science. Similarly, digital steganography hides…

Avoid Online Tax Scams Cyber Fraud
20 April 2017

Avoid Online Tax Scams

Online tax scams are reaching a high level with cybercriminals deliberately scheming to ensure victims complete information requested to compromise personal details. The main targets of the scams are self-employed…

Challenges facing cybersecurity in healthcare Cybercrime
13 March 2017

Challenges facing cybersecurity in healthcare

Cybercriminals are constantly searching for methods of penetrating major infrastructure within a country, particularly healthcare systems. Securing healthcare systems is a necessary requirement for governments and all stakeholders involved in…

Search Topic

Calendar

February 2021
M T W T F S S
1234567
891011121314
15161718192021
22232425262728
« Dec    

Archives

Categories

Social Feed

Tweets by TechDecoded_
  • Subscribe to TechDecoded Mailing List
© 2014 - 2021 TechDecoded, All Rights Reserved
Magazine Point by Axle Themes