- Week in Review
The Guyana National Computer Incident Response Team (GNCIRT) seeks to provide technical assistance to public agencies to prevent and respond effectively to information security incidents of national importance.
![...](/CIRT_LOGO.png)
![CA082022_165 Browser Updates: Featured Image](/static/c31e43b626a33afafb06065fbaa635cc/97a19/Browser_Updates_2022.jpg)
Browser Updates
Get Safe Online recommends that for optimum protection against fraud when using the internet, you always run the latest version of your chosen browser that…
![CA082022_166 Software Decommissioning: Featured Image](/static/1cc1ee7b03e36c16b9d33678b94d261c/ae087/Software_Decommissioning_2022.jpg)
Software Decommissioning
It is important that you carry out regular reviews or audits of application software on all computers and information systems, and ensure that redundant software…
![CA082022_167 Safe Disposal: Featured Image](/static/8a3064f8dd6e978e6aecf4f57eca5b26/ae087/Safe_Disposal_2022.jpg)
Safe Disposal
Smartphones and tablets that you no longer need should be disposed of with great care. The data on your device can easily be accessed whether…
![default place holder featured graphics](/static/ab59f2fb91fff977374ca49c96374ff4/57149/defaultArticle.webp)
Drupal security advisory
Drupal has published a security advisory highlighting vulnerabilities in the following product on October 4, 2023. It is recommended that you take the necessary precautions…
![default place holder featured graphics](/static/ab59f2fb91fff977374ca49c96374ff4/57149/defaultArticle.webp)
SonicWall security advis
SonicWall has published a security advisory highlighting vulnerabilities in the following product on September 29, 2023. It is recommended that you take the necessary precautions…
![default place holder featured graphics](/static/ab59f2fb91fff977374ca49c96374ff4/57149/defaultArticle.webp)
Microsoft Edge security
Microsoft has published a security advisory highlighting vulnerabilities in the following product on October 4, 2023. It is recommended that you take the necessary precautions…
![default place holder featured graphics](/static/ab59f2fb91fff977374ca49c96374ff4/57149/defaultArticle.webp)
New critical Linux vulne
Description Recently, an alarming security vulnerability was discovered in the widely used GNU C library (glibc), which exists in most major Linux versions. This flaw…
![default place holder featured graphics](/static/ab59f2fb91fff977374ca49c96374ff4/57149/defaultArticle.webp)
Certification Scams (Jan
Description In an era where professional certifications play a pivotal role in career advancement and industry recognition, the emergence of certification scams poses a significant…
![default place holder featured graphics](/static/ab59f2fb91fff977374ca49c96374ff4/57149/defaultArticle.webp)
Researchers from ESET fo
Description Cybersecurity researchers from ESET uncovered a sophisticated cyberespionage campaign named “Operation Jacana” targeting a government entity in Guyana. This incident highlights the growing concerns…
![default place holder featured graphics](/static/ab59f2fb91fff977374ca49c96374ff4/57149/defaultArticle.webp)
Avoid using your work em
It is advisable to refrain from using your work email address on publicly accessible internet websites. Work emails often contain sensitive information related to your…
![default place holder featured graphics](/static/ab59f2fb91fff977374ca49c96374ff4/57149/defaultArticle.webp)
Use antivirus software a
To access your data, hackers can target your systems and networks using a variety of techniques, including malware, viruses, phishing assaults, trojans, spyware, etc. Your…
![default place holder featured graphics](/static/ab59f2fb91fff977374ca49c96374ff4/57149/defaultArticle.webp)
Utilize multi-factor or
A service that strengthens the security of the traditional password method of online identification is two-factor or multi-factor authentication. You would typically submit a username…