Enhance your digital security

Pumba Cyber Security takes a different approach to small business cyber security. Practical training on fundamental cyber security topics, coupled with the right free and open-source software security tools, a small business can secure their data as well as any large scale Cyber Security Department. Regardless of technical acumen, anyone can learn these fundamental tools, principals, and best practices. 

You couldn't have gotten this far without doing these basic tasks.

Predictable user behaviors

You can’t use a device or access your accounts until you’ve logged in with a password or pin. Facial Recognition and Two-Factor Authentication exists, but not many people use them across all of their devices and accounts.  Using a single password is the most common way people sign in. 

To access the internet, you must connect to a Wi-Fi or  Ethernet Network (hardwired). 

Insecure home and office networks are easy targets for cyber criminals.  If they’re able to hack into your company’s network they can view, steal, and leak all information being sent across the network. Everything. 

A Web Browser is what you use to access websites. Google Chrome, Mozilla Firefox, Microsoft Edge are examples of web browsers.

Most don’t realize that your web browser has the ability to save and store information about you in files hidden on your computer.  Users have the ability to change these settings but it’s very difficult to know which ones to change, even for an IT professional. 

Our Focus

Pumba Cyber Security takes a holistic approach to securing small business IT.  We provide comprehensive, relevant, and practical training focused on core behaviors that standard users perform daily. Securing these particular behaviors builds a strong foundation and ensures even the most non-technical users can incorporate these principals with ease and confidence. 

To accompany our training we install, configure, and deploy security software that any user can affectively use and manage, immediately. We demonstrate the software for you and then teach your users how to use it in their daily routine so that no user is left behind. Our training and software recommendations combine to create a unshakeable cyber security posture. 

 

The big Three

Password Security

Weak passwords pose a major security risk to small business. They can lead to sensitive user and business information being leaked and potentially destroying a business. Hackers have tools that can crack weak passwords in seconds.

Web Browser Security

We use web browser daily. We input information like usernames, passwords, credit card details, search engine queries and web application information. What most don't realize is that you web browser can save and store this information on your computer, without you knowing.

Network Security

Wi-Fi and Ethernet Networks is how we connect to the internet. The average user doesn't usually know how to secure their home or office networks. A Virtual Private Networks (VPNs) is an application that fully encrypts your network traffic to keep you secure even if connected to an insecure wi-fi or ethernet network.

Password Managers

A password is like a key to the front door. With a password a hacker doesn’t have to do any hacking, they already have what they need. Luckily, a software tool called a Password Manager was created to save, store, and organize your passwords in an encrypted vault. These Password Mangers can generate complex passwords for you and autofill your passwords when you go to login. With a Password Manager, you’ll only ever have to remember one password again.

Web Browser Add-Ons

You have to use a web browser in order to view a website. Google Chrome, Mozilla Firefox, and Microsoft Edge are examples of web browsers. Not many people know that your web browser has the ability to save information that you input into a file stored on your computer. Sensitive information like personal details, credit card numbers, search engine history, and more will be saved somewhere unless you explicitly know which web browser settings to change. Browser add-ons also exist to keep you information secure and remove any information that was unintentionally saved. 

Network Security

Virtual Private Networks

You must connect to a Wi-Fi or Ethernet Network to access the internet. Insecure wi-fi and ethernet networks are a major target for cyber threats. They have tools that allow them to intercept your web traffic to see exactly what you do. 

That’s where Virtual Private Networks come in. It can sound intimidating but a VPN is a software that fully encrypts your internet activity so no one can see what your doing. It can be installed across all your devices i.e. computer, phone, and router, and setup to protect your entire business network. VPN’s can provide additional capabilities but to start we’ll focus on the privacy and security aspect of Virtual Private Networks. 

It all starts with a stolen password

Back to
the basics

As an Offensive Cyber Security Specialist I’ve learned some of the most advanced tactics cyber criminals use to steal business and end-user data. These bad actors (hackers) are highly intelligent and use tools that make their attacks easy and effective.

Despite the creativity and savviness of these bad actors, what I’ve learned will surprise you. All of these attacks begin A stolen password, weak network security, or data unknowingly saved in a users web browser.  Later on the hacks get quite technical but the point is none of that would happen if these areas were secured. 

The good news is that securing these foundational aspects of cyber security can protect your employees and business from the most skilled adversary. 

Let's talk business

Not sure where to begin?

Onsite Consultation