Yusra Shaeik

What are the 5 key controls of Cyber Essentials?

If you want to protect your organisation (or protect your reputation and get to work on bigger projects, e.g. with the government) , the UK government-backed Cyber Essentials scheme is the perfect place to start. It includes five key “controls” that cover the main parts of organisation cybersecurity.

Employee monitoring software: productivity vs ethics

The rise in hybrid and remote working has led many organisations to start using employee monitoring software to check on their distributed teams. But monitoring your team’s productivity remotely leads to all kinds of ethical considerations. Where does monitoring for productivity purposes end and privacy begin?

What is a VPN? How does it work?

All your VPN questions are about to be answered! Virtual Private Networks have been growing in importance and profile in recent years. But do you understand what they are, how they work, or what they’re for?

What is a hacktivist? Understanding their rise

Hacker by the window

What is a hacktivist? Sometimes referred to as cyber activists, “hacktivists” are non-mercenary individuals or groups who target organisations whose actions have the appearance of environmental or social responsibility but none of the substance.