Skip to content
L2 Cyber Security Solutions
  • Home
  • Services
  • Prices
  • GDPR
  • Blog
  • Testimonials
  • About Us
  • Contact Us
L2 Cyber Security Solutions
  • Home
  • Services
  • Prices
  • GDPR
  • Blog
  • Testimonials
  • About Us
  • Contact Us

Posts Tagged ‘Data Breaches’

#WeekendWisdom 099 Using the security.txt file

October 15, 2021 | Comments Off on #WeekendWisdom 099 Using the security.txt file
using the security.txt file - a picture of two cute puppies looking up at the camera with what looks like a bit of cream on their noses.

Welcome to #WeekendWisdom number 99. This week we’re going to talk about using the security.txt file.

Read More

#WeekendWisdom 074 Data Scraping or Data Breaches

April 16, 2021 | Comments Off on #WeekendWisdom 074 Data Scraping or Data Breaches
Data Scraping or Data Breaches

Welcome to #WeekendWisdom number 74. This week we’re going to talk about Data Scraping or Data Breaches?

Read More

#WeekendWisdom 068 A Data Breach of Bank Details

March 5, 2021 | Comments Off on #WeekendWisdom 068 A Data Breach of Bank Details
Data Breach of Bank Details

Welcome to #WeekendWisdom number 68. This week we’re going to talk about a data breach of bank details.

Read More

#WeekendWisdom 067 Data Protection Commission Report 2020

February 26, 2021 | Comments Off on #WeekendWisdom 067 Data Protection Commission Report 2020
Data Protection Commission Report 2020

Welcome to #WeekendWisdom number 67. This week we’re going to talk about Data Protection Commission Report 2020.

Read More

The Ten Commandments

View our Ten Commandments of Cyber Security.

Recent Posts

  • Cyber Security for Charities
  • Cyber Security for Small Business
  • IT Task Calendar for Small and Medium Businesses
  • Browser Password Manager is not as secure as you think
  • Legal Basis for Processing

Search

Tags

#SecuritySimplified #WeekendWisdom Backups Best Practice Botnet Breach Clare Commandments Coronavirus Covid-19 Covid19 CyberSecMonth Cyber Security Cybersecurity Data Breach Data Privacy Data Protection Data Protection Commission DDOS Defence in Depth DPC Facebook Fake Fraud GDPR Internet of Things IoT Limerick LinkedIn Malware Microsoft Mobile Security Password Phishing Ransomware Scam Security Social Engineering Spear-Phishing Tipperary Training Two-Factor-Authentication Vulnerability Webinar Yahoo
© 2017-2025 L2 Cyber Security | Data Protection Notice
Scroll To Top