- Week in Review
The Guyana National Computer Incident Response Team (GNCIRT) seeks to provide technical assistance to public agencies to prevent and respond effectively to information security incidents of national importance.
Browser Updates
Get Safe Online recommends that for optimum protection against fraud when using the internet, you always run the latest version of your chosen browser that…
Software Decommissioning
It is important that you carry out regular reviews or audits of application software on all computers and information systems, and ensure that redundant software…
Safe Disposal
Smartphones and tablets that you no longer need should be disposed of with great care. The data on your device can easily be accessed whether…
Drupal security advisory
Drupal has published a security advisory highlighting vulnerabilities in the following product on October 4, 2023. It is recommended that you take the necessary precautions…
SonicWall security advis
SonicWall has published a security advisory highlighting vulnerabilities in the following product on September 29, 2023. It is recommended that you take the necessary precautions…
Microsoft Edge security
Microsoft has published a security advisory highlighting vulnerabilities in the following product on October 4, 2023. It is recommended that you take the necessary precautions…
New critical Linux vulne
Description Recently, an alarming security vulnerability was discovered in the widely used GNU C library (glibc), which exists in most major Linux versions. This flaw…
Certification Scams (Jan
Description In an era where professional certifications play a pivotal role in career advancement and industry recognition, the emergence of certification scams poses a significant…
Researchers from ESET fo
Description Cybersecurity researchers from ESET uncovered a sophisticated cyberespionage campaign named “Operation Jacana” targeting a government entity in Guyana. This incident highlights the growing concerns…
Avoid using your work em
It is advisable to refrain from using your work email address on publicly accessible internet websites. Work emails often contain sensitive information related to your…
Use antivirus software a
To access your data, hackers can target your systems and networks using a variety of techniques, including malware, viruses, phishing assaults, trojans, spyware, etc. Your…
Utilize multi-factor or
A service that strengthens the security of the traditional password method of online identification is two-factor or multi-factor authentication. You would typically submit a username…