GoldPhishJan 262 minHow to promote a cyber-secure workplace cultureClassroom-based death-by-Powerpoint is hopefully a thing of the past, along with day-long training courses.
GoldPhishNov 17, 20213 minHow do big brands know us so well?As you reach for the credit card to revel in the Black Friday offers this month, take a moment to consider the way big brands connect...
GoldPhishAug 27, 20215 minMobile device security: Your world in the palm of your handIf there is one device we as humans increasingly seem unable to live without, it’s our phones – a.k.a. mobile devices.
GoldPhishAug 5, 20215 minKids & tech: Parenting well in today's digital ageKids & tech: It’s all screens, keys, and device-driven 'entertainment'... But it's time we find some balance.
GoldPhishJul 7, 20215 min11 simple steps to a digital declutterHave you ever felt like you’ve wasted precious time because of the mess, the chaos? It’s time for a digital declutter – pick up, sort,...
GoldPhishFeb 23, 20212 minThe benefits and drawbacks of blockchain in cyber securityAs the world begins to rely more and more on technology for education and work, cyber security is a must that can’t be ignored. With over...
GoldPhishDec 1, 20203 minWhat big brands know about youTechnology has revolutionised the way brands connect with their audience. From using social media platforms like Twitter and Facebook, to...
GoldPhishNov 24, 20205 minCreate a cyber secure environment working from homeCreate a cyber secure environment working from home
GoldPhishMay 6, 20203 minRemote Access FraudImagine falling victim to Remote Access Fraud… You wake up one morning to find you’ve lost some money. Not the loose change your children...
GoldPhishApr 5, 20204 minCOVID-19 outbreak: How to avoid cyber criminals taking advantageWe have been overrun these past few months with everything Coronavirus, COVID-19-related, and with it, a near-constant stream of...
GoldPhishMar 3, 20205 minCameras and Microphones | Are you being watched?Are we being spied on via our cameras and microphones on our personal devices? Built-in device cameras and microphones are great. They...
GoldPhishFeb 11, 20203 minOnline Gaming and Cyber Crime – are you playing, or being played?When it comes to games – especially online gaming, it’s one thing to play, but it’s altogether something else to be played! Three...
GoldPhishJun 6, 20193 minAccess Control in the digital worldWe all want to feel safe. We all want to feel secure. We all want to know that the things we value are safe and secure. Safety and...
GoldPhishApr 8, 201910 minFacebook and fencing yours inIt’s safe to say Facebook isn’t safe. Just last month (Thursday 21 March 2019) Facebook announced yet another data breach – the third in...
GoldPhishDec 13, 20187 minOnline Sextortion – the blackmailer in your inbox!Blackmail has been around for as long as shame – since the very moment criminals first discovered the value we hold in keeping that shame...
GoldPhishOct 23, 20183 minWhat is a SIM Swap Scam?In June of this year (2018) an 85-year-old South African pensioner had R300 000 – roughly USD $20 000, stolen from his bank account in a...
GoldPhishAug 8, 20185 minCloud Security | Securing your valuable dataCloud Security? How does one secure a cloud? With all the jargon, threats and ever-changing technology, securely tying down your digital...