Blog

COVID-19 Phishing Attacks

Phishers Exploiting COVID-19 Coronavirus

Phishing attacks are using the COVID-19 Coronavirus as a means of attracting unsuspecting individuals. Information Security blog from Hut Six Security.

Small Business Security Basics

SME Security is No Picnic

SME Security is No Picnic: problem in Chair not in Computer. Information security blog by information security awareness training provider Hut Six Security.

Data Protection Act for Businesses

How Does the Data Protection Act Affect Businesses?

How Does the Data Protection Act Affect Businesses? Rights, Obligations and Important Concepts. Blog by Hut Six Security.

Huawei Devices trigger a Google Warning

Google Warning Over Huawei Devices

Google Warning Over Huawei Devices: Huawei concerns continue. - blog by Information Security Awareness Training provider Hut Six Security

Data Protection Act Compensation

How Much Compensation for Breach of Data Protection Act?

How Much Compensation for Breach of Data Protection Act? Your Data Rights and Right to Compensation. Blog by Hut Six Security.

What is Phishing?

What is Phishing? In Computer Technology - It’s a Number 1 Threat

Phishing is a number one cyber threat, and awareness training is required to ensure all employees realise it's a business-critical matter.

Phishing Basics

What Does Phishing Mean in Computer Terms?

What does phishing mean in computer terms? The understanding of this term is at the core of Information Security awareness. Blog by Hut Six Security.

Protecting your Digital Information

How to Keep Information Secure on a Computer - the Easy Way

Protecting data on your computer in 5 steps: Password Protection, VPNs, Anti-virus, Software Updates and Security Awareness.

Phishing Texts or SMSs

How to Block Phishing Texts

Knowing How to Block Phishing Texts is vital to personal information security in the 21st century. Blog by Hut Six Security.

Security in the UK Education Sector

Information Security Attacks Threaten the UK Education Sector

How do Information Security Attacks threaten the UK Education Sector? Blog by information security awareness training provider Hut Six Security.

Cloud Storage Security

Is Information Stored in the Cloud Secure?

There remains concerns about the overall security of storing and processing information in the cloud. Is Information Stored in the Cloud Secure?

Data Breaches 2019

The Biggest Data Breaches and Hacks of 2019

The Biggest Data Breaches and Hacks of 2019: As a new year begins, it's time to begin reflecting on what has been observed. Blog by Hut Six

Google Chrome Password Security

Google Chrome Goes for Gold in Password Security

Google Chrome introduces new password safety features. Cybersecurity blog by Information Security awareness training provider Hut Six.

Pseudonymisation in GPDR

What is Pseudonymisation?

What is pseudonymisation, and why it important to GDPR compliance? Blog from information security awareness training provider Hut Six.

Windows Security Flaw Discovered by NSA

NSA Discloses Severe Windows 10 Security Flaw

An extremely serious Windows 10 Security Flaw has been exposed by the NSA. Blog by cyber security awareness training provider Hut Six.