
Password hygiene and my word of the week
Password hygiene is important – we all know that. We know about the importance of POPI and GDPR. But this week I discovered some problems when I tried to improve my password hygiene.

Password hygiene is important – we all know that. We know about the importance of POPI and GDPR. But this week I discovered some problems when I tried to improve my password hygiene.

In part 4 of the series on Java modularity, we look at the concept of services. We can use the module system to specify the service interface, service implementation and service client.
If Lewis wasn’t such an outstanding Java lecturer, I’d want to hire him as a handyman. He enjoys DIY tasks, and does them with the same precision as he does everything else. (If you’ve attended one of his courses, you’ll know what I mean. I draw a vague shape on

This is part 3 of the series on Java modularity. We look at a variety of directives that can be used with Java modules.

Big companies have rigid IT policies and systems to protect intellectual property. These policies prevent employees from installing software, visiting certain sites, using USB drives and more. So when the pandemic required people to work from home, a lot of security was already in place. But what about the companies

This is part 2 in our series on Java modularity. We look at Java module declarations and descriptors, directives and naming rules.

Sometimes I feel that I do a lot of work, but I don’t make much progress. Part of that is lockdown. (Part of it is dealing with the MICT SETA, which means I really didn’t make much progress.) And part of it is the need to remember one of life’s

There are many misconceptions about cybersecurity. Today I’m going to look at some of these myths. It’s a good reminder for all of us to check our thinking.

Modularization is a long overdue feature in Java. In the first of a series of articles on Java modularity, we look at what a module is, the goals of Java modularity, and how to list the Java modules.

Some statistics claim that 90% of security breaches involve human error. That means human error is the biggest cyber security risk for your company. The pandemic and remote working make this even more critical than before. There’s been a huge increase in attacks since the start of the pandemic. Working from home
Thank you for completing the form. We're excited that you have chosen to contact us about training. We will process the information as soon as we can, and we will do our best to contact you within 1 working day. (Please note that our offices are closed over weekends and public holidays.)
Our privacy policy ensures your data is safe: Incus Data does not sell or otherwise distribute email addresses. We will not divulge your personal information to anyone unless specifically authorised by you.
If you need any further information, please contact us on tel: (27) 12-666-2020 or email info@incusdata.com