Latest Posts
Cyber Security risks of a Bring Your Own Device (BYOD) policy
Shadow IT and Cyber Security
Developing a data encryption strategy
Emerging cyber security challenges with legacy systems
Remote learning and cyber security risks for the education sector
  • Twitter
Skip to content
  • Home
  • Blog Archive
  • About TechDecoded
  • Contact Us
TechDecoded

Cyber Security through Cyber Education

  • Home
  • Blog Archive
  • About TechDecoded
  • Contact Us
Bring Your Own Device (BYOD)

Cyber Security risks of a Bring Your Own Device (BYOD) policy

12 September 2020
Shadow IT

Shadow IT and Cyber Security

Data

Developing a data encryption strategy

Legacy Systems

Emerging cyber security challenges with legacy systems

Coronavirus

Remote learning and cyber security risks for the education sector

Cyber Security risks of a Bring Your Own Device (BYOD) policy

Shadow IT and Cyber Security

Developing a data encryption strategy

Emerging cyber security challenges with legacy systems

Remote learning and cyber security risks for the education sector

Covid-19 and the rise of RDP attacks

Coronavirus and working from home

What is Multifactor Authentication (MFA)?

Patch Management

Cyber Security and Software Development

Latest Posts

Bring Your Own Device (BYOD)
12 September 2020

Cyber Security risks of a Bring Your Own Device (BYOD) policy

As the IT industry evolved and the usage of technology proliferated, the…

Shadow IT
7 August 2020

Shadow IT and Cyber Security

Any IT (Information Technology) applications, projects or software that are managed outside…

Data
17 July 2020

Developing a data encryption strategy

As companies are experiencing a higher number of regulations on handling data,…

Popular Posts

Cybersecurity
21 January 2019

Best cyber security practices

Making use of the best cyber security practices ensures protection of personal data. Several cyber security mechanisms can be utilised collectively for enhanced safeguarding of any computer system. TechDecoded has…

Cyber threats are location based Cybercrime
11 February 2018

Cyber threats that are location-based

An emerging trend among cybercriminals is to target victims based on their geo location. Cybercrime is now a global problem affecting individuals, organisations and governments thus cybercriminals are benefiting by…

What is Identity Fraud? Cybercrime
22 September 2017

What is Identity Theft?

Identity theft is a prevalent problem where cybercriminals are using digital means to steal personal data relating to victims. Nevertheless, identity theft is a complex form of cyber fraud which…

Best ways to defend against Ransomware Cybersecurity
29 August 2017

Best ways to defend against Ransomware

The possibility of falling victim to a Ransomware attack is highly likely for individual computer and Internet users around the globe. Defending against Ransomware is a requisite for which application…

Tips for protection against cyber threats Cybersecurity
31 July 2017

Tips for protection against cyber threats

Increased cyber threats from malware, ransomware, trojans, viruses and other forms of cybercrime have proliferated apprehension among many Internet users. A reason for the uneasiness among cyber users is that…

Digital Steganography Threats Cybercrime
19 June 2017

Digital Steganography Threats

Steganography is defined as the process of concealing messages or information. In other words, a message is hidden through the proficient use of art or science. Similarly, digital steganography hides…

Avoid Online Tax Scams Cyber Fraud
20 April 2017

Avoid Online Tax Scams

Online tax scams are reaching a high level with cybercriminals deliberately scheming to ensure victims complete information requested to compromise personal details. The main targets of the scams are self-employed…

Challenges facing cybersecurity in healthcare Cybercrime
13 March 2017

Challenges facing cybersecurity in healthcare

Cybercriminals are constantly searching for methods of penetrating major infrastructure within a country, particularly healthcare systems. Securing healthcare systems is a necessary requirement for governments and all stakeholders involved in…

Search Topic

Calendar

January 2021
M T W T F S S
 123
45678910
11121314151617
18192021222324
25262728293031
« Sep    

Archives

Categories

Social Feed

Tweets by TechDecoded_
  • Subscribe to TechDecoded Mailing List
© 2014 - 2021 TechDecoded, All Rights Reserved
Magazine Point by Axle Themes