• MTA Security Fundamentals Guide Book
    Tech

    MTA Security Fundamentals (98-367) Study Guide

    If you’re looking at a career in information security, then you’ve probably heard of the importance of certifications. The most recommended cyber security certification seems to be CompTIA’s Security+, however, a Microsoft Technology Associate (MTA) certification proves a proficiency in Windows security operations. Which is kinda a required skill when the majority of clients’ budget systems aren’t iMacs or running Linux. So, let’s dive right into an MTA in Security Fundamentals and how to study for the exam. The MTA Security Fundamentals certification evaluates your understanding of security layers and software, as well as operating system and network security. This is only at a foundation level and by no means do…

  • What's your iPhone Battery?
    Tech

    Why your iPhone Battery Dies at 50%

    Does your iPhone lie about how much battery power it has left? Apple constantly seems to be “trying to fix” these bugs which are unexpectedly causing our iPhones to die at a high battery percentage, but the issue isn’t necessarily a problem with the battery. So, if your iPhone has suddenly died, here’s what to try before taking it to the repair shop! Check the Battery Indicator is Updating If you have an iPhone 6S or 6S Plus, they encounter a problem in which the battery power indicator becomes stuck. This occurred when the users time zone changed and/or they manually updated their clock. If you think this issue could…

  • Active Directory vs Domain Controllers
    Tech

    Active Directory vs Domain Controllers

    Ever considered the difference between an active directory and domain controllers? Generally, the terms are used to refer to the same thing, but the active directory is not the same as a domain controller. The active directory is a set of services provided by domain controllers, where the term domain controller refers to the umbrella software. Explore more about Windows active directory vs domain controllers in this post! What is an Active Directory? Microsoft Active Directory is a directory service, much like a phone book, that stores information on users, network resources, files and other network objects. Its purpose is to provide an organised, hierarchical structure to make finding and…

  • cyber security principles
    Tech

    10 Core Principles of Cyber Security

    Understanding the basic layers of information security is key to building your security knowledge. This post outlines 10 principles of cyber security and addresses the CIA security triad, the principle of least privilege and attack surfaces.  Understanding the CIA Triad Firstly, you should understand the purpose of security on a network. The CIA Triad represents the core goals of an information security program: Confidentiality Integrity Availability Confidentiality deals with keeping information, networks, and systems secure from unauthorised access. Several technologies that support confidentiality in enterprise security include strong encryption, authentication and access controls. Integrity, on the other hand, is defined as the consistency, accuracy, and validity of data or information…

  • Tech

    10 Rules for Protecting your Computer from Malware

    The digital world has revolutionized our lives. We now live in an age that would have been considered science fiction not so long ago, and every day we hold more technology in our smartphones than what took astronauts to the moon. Clearly, the internet, smartphones, tablets, and computers provide us with an incredible amount of information. Yet, as our reliance on computers has grown, so have the dangers that accompany them. To help mitigate the risk malware can present, I have put together this list of tips on how to prevent malware infections. Firstly, What is Malware? Malware is short for malicious software, which is a program designed to infiltrate…

  • Tech

    IDS vs IPS: Why You Should Really Have Both

    Intrusion Detection Systems (IDS) analyse network traffic for signatures that match known cyberattacks. Intrusion Prevention Systems (IPS) also analyses packets, but can also stop the packet from being delivered based on what kind of attacks it detects — helping to stop an attack. These are used by network administrators in protecting the attack surface of a business. The significant difference between IDS and IPS equates to the difference in protection and detection. IPS uses the diagnostics of IDS, but builds on the technology to intervene when potential threats are identified. Intrusion Detection Systems (IDS) IDS works to identify potential attacks and notify the user. The identification process is the process…

  • Tech

    DevOps: What Exactly is Infrastructure as Code?

    Infrastructure as Code, or programmable infrastructure, builds off automation techniques to reduce the amount of resources spent to replicate environments. In basic terms, allowing the “copy and paste” of environments to avoid plan, procure and provision methods for every instance of a set-up. The infrastructure managed includes physical equipment as well as virtual machines, containers, and software-defined networks. (Klein & Reynolds, 2018; Elder & Williams, 2019). One principle of IaC is idempotence, a property ensuring a deployment command always sets the target environment into the same configuration, regardless of the environment’s starting state. This is achieved by automatically configuring an existing target or by discarding the existing target and recreating…

  • Tech

    Creating Memorable & Secure Passwords

    From Netflix to banking, passwords are the primary security measure to securing your accounts – and our employers too. It is no wonder why we have password policy shoved down our throats! The balance between having a memorable and secure password still hasn’t been perfected by most of us, and good practice needs us to have a unique password for every site or service to protect our online accounts. How Does a Password get Hacked? The main reason for securing passwords should be to avoid password hacking, but have you ever considered how people hack your passwords? Brute-force and dictionary attacks repeatedly attempt to login to your account as many…

  • Tech

    UAV-Assisted Networking and Communications

    Unmanned Aerial Vehicles (UAVs), otherwise known as drones, are aircraft devices which operate without an onboard pilot. The navigational autonomy of UAVs previously enabled applications for military, telecommunications and surveillance, however, only recently have the communication capabilities of these devices been considered. Among balloons and small aircraft, UAVs offer reliable and cost-effective wireless communication solutions (Bucaille et al, 2013). Using a low altitude platform (LAP), such as UAVs, allows for easy deployment and line-of-sight (LoS) communication links, unlike high altitude platform (HAP) alternatives, such as balloons. However, HAPs offer increased endurance and coverage, ergo are more suitable for covering large geographic areas. Zeng et al. (2016, p. 37) introduced three…