One thing to acknowledge in the digital world we live in is the volume of systems we have access to. Whether it be Facebook, Twitter, Amazon, Netflix and a whole lot more then one thing they have in common is that you need a username and password. Now, if you follow the guidance in the blog about passwords it will help protect you but if you use the same password for multiple systems, you can open yourself up to a scary scenario where a hacker can access all of these with ease.
ReadBlog
4 result(s)
Key things to look out for in a phishing email are Incorrect email addresses. Spelling mistakes. Language used if it is from a corporate account is it professional? Tone, do they usually communicate in this way? Want to know what else? Read the latest IT Blog...
ReadThis week the blog is focusing on passwords. We talk about two techniques that can help you create passwords that have complexity, to make it difficult enough for hackers to give up and move on.
ReadWelcome to the first IT blog for Ayrshire College. The theme for the first few blogs is going to be on Cyber Security and hopefully giving you some insight into the techniques criminals use and how you can protect yourself against them.
Read