resources

CIL Security Advisory

Your trusted resource for the latest security updates, threat intelligence, and proactive solutions.

Employee Security Awareness Training

Employee Security Awareness Training

IntroductionHumans have been identified as the weakest link in cybersecurity, with 68% of breaches involving a non-malicious human element. However,…

FEBRUARY 12TH, 2025

Recognising and Reporting Security Incidents: How to Act Quickly

Recognising and Reporting Security Incidents: How to Act Quickly

IntroductionSecurity incidents can happen unexpectedly and have far-reaching consequences for both individuals and organisations. For individuals, the impact can be…

FEBRUARY 10TH, 2025

Shoulder Surfing: The Silent Threat Lurking Around to Steal Your Data

Shoulder Surfing: The Silent Threat Lurking Around to Steal Your Data

IntroductionHave you ever felt a stranger’s prying eyes looking into your phone in public areas? This is a very common…

FEBRUARY 5TH, 2025

Credential Harvesting: How Criminals Steal Your Logins

Credential Harvesting: How Criminals Steal Your Logins

IntroductionCredential harvesting has become increasingly sophisticated, with cybercriminals employing various techniques to steal login credentials. These attacks can lead to…

FEBRUARY 3RD, 2025

Insecure APIs: Understanding the Risks

Insecure APIs: Understanding the Risks

IntroductionAPIs (Application Programming Interfaces) are core components of modern software that enable systems to communicate and share data. Properly securing…

JANUARY 29TH, 2025

Why Simply Deleting isn’t Enough to Protect Your Data

Why Simply Deleting isn’t Enough to Protect Your Data

IntroductionDeleting a file doesn’t truly erase it. When you hit “delete,” your operating system removes the file’s reference from its…

JANUARY 27TH, 2025

Internet of Things (IoT) Security – Why Your Smart Devices Could Be an Open Door

Internet of Things (IoT) Security – Why Your Smart Devices Could Be an Open Door

IntroductionThe convenience of smart devices—such as smart TVs, speakers, cameras, and appliances—comes with a hidden risk: they can be exploited…

JANUARY 22ND, 2025

Physical Security for Laptops and Devices

Physical Security for Laptops and Devices

IntroductionIn today's interconnected world, laptops and mobile devices are essential tools for productivity and connectivity. However, their portability and high…

JANUARY 20TH, 2025

Stop the Hackers at the Door: The Power of Unique Passwords

Stop the Hackers at the Door: The Power of Unique Passwords

IntroductionHave you ever used the same key to unlock your house, your car, and your office? Probably not. It's a…

JANUARY 15TH, 2025

Disclaimer: This publication is provided for informational purposes only and does not constitute professional advice or an endorsement of any specific products, services, or strategies. Readers are advised to use their discretion and seek professional advice before making any business or technology-related decisions based on the information provided.

Never miss a CIL Security Advisory

Stay informed with the latest security updates and insights from CIL.

Contact Us

Check your email. We have a message for you.

Start a project

Check your email. We have a message for you.

We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies. You can manage your preferences or learn more in our Cookie Policy .