Security in 60 Seconds - Unique Passwords
Mastering the art of creating unique passwords is paramount. Safeguarding your digital presence with distinct and robust passwords shields personal information and fortifies the bulwark against cyber threats, ensuring a resilient defence a...
Security in 60 Seconds - White Hat Hackers
White hat hackers are ethical computer security experts who use their skills to identify and fix vulnerabilities in systems, networks, and software. Unlike malicious hackers, known as black hat hackers, white hat hackers operate with the i...
Security in 60 Seconds - Grey Hat Hackers
Grey hat hackers are individuals who straddle the ethical boundary between black hat and white hat hacking. Learn about them in part two of a three-video series on hackers, all in just 60 seconds!
Security in 60 Seconds QR Code Safety
QR code use has skyrocketed, but scanning with caution is essential as they can potentially lead to malicious websites or trigger malware downloads, posing security risks to personal data and device integrity. Learn more in this episode of...
Security in 60 Seconds Insider Threats
Insider threats present real risks to organizational security. What's the difference between an accidental insider threat and a malicious one? Find out in this episode of Security in 60 Seconds!
Security in 60 Seconds - Deepfakes
The use of Deepfakes is rising in politics, financial markets, and even in organizational espionage. Do you know how to recognize one, or the steps to take to learn if the information you digest is accurate? Learn more in this episode of S...
Black Hat Hackers
Black hat hackers are the most infamous characters on the hacking spectrum. We've covered white hat hackers and grey hat hackers; now, learn about the black hats in the finale of our three-video series on hackers. All in just 60 seconds.
Security in 60 Seconds Penetration Testing
Penetration testing (also known as pen testing) is a key tool in every organization's cyber security toolkit. Learn more about it in this episode of Security in 60 Seconds!
Security in 60 Seconds - Critical Infrastructure
Critical technology infrastructure refers to the essential systems and components—like communication networks, power grids, data centers, and cybersecurity frameworks—that support the functioning and security of a society's most vital serv...
Security in 60 Seconds Supply Chain Security
A secure supply chain ensures that products are delivered safely and on time, maintaining customer trust and business continuity. When working well, supply chains are not front of mind, but when scrambled, chaos ensues. Learn what we recom...
Security in 60 Seconds - Malvertising 720p
Malvertising, or malicious advertising, is the use of online ads to spread malware by embedding malicious code within seemingly legitimate advertisements. When users click are exposed to these ads, hackers are half way to their personal in...
Security in 60 Seconds - Cyber Extortion
Cyber extortion is a type of cybercrime where attackers threaten to harm a victim's digital assets, such as data, systems, or networks, unless a ransom is paid. Common tactics include deploying ransomware to encrypt files or threatening to...
Security in 60 Seconds - Keyloggers
Imagine someone secretly reading and saving every text you write and every password you enter. That's what a Keylogger does! Learn more about this malicious tool in our most recent episode of Security in 60 Seconds!