Back

Secure-checklist

SECURE USER CHECKLIST

Threat actors actively target end-users as a primary route to compromise. Some criminals may be targeting the end-user directly, for example to conduct financial fraud, others will be leveraging the user to gain access to the organisations IT infrastructure

Use our End-User checklist for home Or Office users to stay protected. It has a series of best practises and points that will help you stay secure

Free Tools

As a security & biometrics company, we love open source and we work with a lot of Opensource tools. Here are some of the free tools you can download.