Cyber 101

Develop a view on Cyber

Learn with us as our 8 Part Cyber Edu-series brings you a snippet about the facets of Cyber every last Monday of the month. Issues will cover the latest topics and get you acquainted with cyber in an instant

How can you triumph over cyber challenges today? Cyber attackers are just getting started and no businesses are immune. Keep a lookout on this page for the latest part every month.

Subscribe in the form on your right to receive an exclusive e-book combining all 8 parts of the  series and a bonus infographic at the end of this series in December. 

Cyber 101 Subscription Form 

Subscribe here

Your biggest risk could be you

May 2017 Part I

Hunting in the Cyberspace

You may have read the recent news about one of the largest cyber attacks, the WannaCry Ransomware. This incident is a wake-up call to all organisations alike, requiring global responsibility and attention to prevent future episodes. We hope to shed light on the fundamentals of cyber security with this 8 part Edu-series to help you understand and protect your data.

Cyber attacks, unlike physical warfare, transcend national borders by compromising computer systems and networks. In this interconnected digital sphere, they threaten the very infrastructures that nations and corporations depend on. Data theft, manipulation of networks and disabling online platforms have amounted to considerable repercussions.

Undeniably, major cyber infringements demonstrate the vulnerability of all organizations’ systems. The growing trend of political cyber attacks has formed a new field of spying: cyber espionage – superpowers have engaged cyber software such as Stuxnet, Flame and DuQu, in an attempt to monitor, collect and control its target. Subscribe for more information!


BBC. (2010, August 25). Secret US military computers 'cyber attacked' in 2008. Retrieved from BBC:

BBC. (2013, January 31). New York Times 'hit by hackers from China'. Retrieved from BBC:

Broad, W. J., Markoff, J., & Sanger, D. E. (2011, January 15). Israeli Test on Worm Called Crucial in Iran Nuclear Delay. Retrieved from The New York Times:

CNET. (2017, May 15). WannaCry ransomware: Everything you need to know. Retrieved from CNET:

Fiegerman, S. (2016, December 15). Yahoo says data stolen from 1 billion accounts. Retrieved from CNN:

Jones, S. (2014, August 29). Ukraine: Russia’s new art of war. Retrieved from Financial Times:

Lee, T. B. (2013, November 1). How a grad student trying to build the first botnet brought the Internet to its knees. Retrieved from Washington Post:

Russell, A. (2004, February 28). CIA plot led to huge blast in Siberian gas pipeline. Retrieved from Telegraph:

Telegraph. (2013, January 14). Red October computer virus found. Retrieved from Telegraph:

Did you find this useful?