Money & Business
How is identity data creating headaches for large companies?
Increasingly the costs and risks of holding data are turning toxic for businesses. Bhargav Mitra and Robert McCausland explain why.
Digital & Computing
Can we overcome cyber-fatigue to secure ourselves online?
Richard Forno says focusing on short-term fixes might make us too exhausted to shape a long term solution to the challenges of cybersecurity.
Science, Maths & Technology
Information security
Information security underpins the commercial viability and profitability of enterprises of all sizes and the effectiveness of public sector organisations. This free course begins by explaining why information security and its management are important for any modern organisation and to every individual. You need to be familiar with an ...
Digital & Computing
Network security
Encryption of files and firewalls are just some of the security measures that can be used in security. This free course, Network security, which assumes you have a substantial knowledge of computing, helps to explain the intricacies of the continually changing area of network security by studying the main issues involved in achieving a ...
Digital & Computing
How can governments ensure their cybersecurity is strong?
The state government of Michigan has adopted a response to potential digital attacks that provide a useful model, explains Brian Nussbaum.
video icon
Science, Maths & Technology
How to Survive a Botnet Attack
Have you ever clicked on a link you were unsure of, or downloaded a risky attachment? If so, then you are in danger of becoming part of a Botnet, also known as a ‘zombie army'. The term ‘zombie army’ is used to refer to a number of computer networks that have become infected as a result of malicious third party software sneaking onto a user’s ...