top of page

Search


The Monthly Cyber Resilience Series: MFA Done Right: Practical Setup and Common Pitfalls
If passwords are the weakest link, Multi-Factor Authentication (MFA) is the simplest and most effective reinforcement. MFA means proving your identity using at least two different factors: Something you know (password) Something you have (phone, hardware key) Something you are (biometrics) Even if a password is stolen through phishing or a data breach, MFA can stop the attacker from accessing the account. However, not all MFA is equal. Many organisations introduce MFA and ass
Feb 22


The Monthly Cyber Resilience Series: Why Passwords Still Fail Us
Passwords were never designed to carry the weight we place on them today. Yet they remain the primary key to our email, banking, cloud storage, collaboration platforms, and internal systems. Most security breaches do not begin with advanced hacking. They begin with a compromised account. And most compromised accounts trace back to one of three simple realities: Passwords are reused. Passwords are predictable. Passwords are stolen elsewhere and tried again. Attackers do not “g
Feb 12


The Monthly Cyber Resilience Series: Phishing Awareness - From Campaigns to Real Behaviour Change
Phishing remains the single most effective cyberattack method globally. Not because people are careless — but because phishing attacks are designed to look legitimate, urgent, and familiar. Modern phishing is no longer full of spelling mistakes and suspicious logos. It uses: real company branding compromised email accounts personal data from previous breaches carefully timed messages (invoices, delivery notices, HR emails) This is why awareness must go beyond “don’t click lin
Jan 28


The Monthly Cyber Resilience Series: New Year, New Security Habits
Foundations of Cyber Awareness & Security Posture The start of a new year is when people rethink routines: how they work, how they manage time, how they protect their health. Cybersecurity should be no different. Most cyber incidents do not happen because of sophisticated hackers or zero-day exploits. They happen because of small, repeated behaviours: reused passwords, ignored updates, clicking links without thinking, or assuming that “nothing will happen to us”. Cybersecurit
Jan 26


The Open-Source Cybersecurity Ecosystem: A Sustainable, Transparent and Accessible Alternative to Commercial Tools
Modern cybersecurity relies on a dense and rapidly evolving ecosystem of tools, platforms and services. While most well-known solutions come from the commercial sector — often expensive and closed — a global community of developers continues to build a powerful, transparent and mature open-source ecosystem that today covers almost every security capability, from SIEM and EDR to SAST, SOAR, API protection and cloud security. Open-source brings a set of advantages that are par
Dec 2, 2025
bottom of page
