Google has recently released Chrome 93.0.4577.82 for Windows, Mac, and Linux to fix eleven security vulnerabilities, two of them being zero-days exploited in the wild.


Through the implementation of proper cyber security protocols and routine security screenings, the two security vulnerabilities were found before they could be exploited.


Following Google’s example, we too, should take charge in fighting off unwanted hacking attempts and potential vulnerabilities. Prevention is the best solution.


Here are some tips on how to do so:

  • Ensure your Anti-Virus signature is Up to date.
  • Perform daily Anti-Virus scans whenever possible.
  • Ensure system is patched against any known bugs by performing regular windows updates.
  • Be vigilant about phishing attempts. Always be wary of suspicious emails and verify before clicking any links or downloading any attachments, especially if the email comes from an external source.
  • Verify a link in an email/SMS by checking the domain name of the site, as it is an indicator of whether the site is legitimate. Users can hover their mouse over the link to ensure that they are being directed to the Uniform Resource Locator (URL) stated.
  • Keep a backup of all your important files in case of ransomware attacks. Keeping a backup ensures you have a workable copy of your files to access and restore from.


Why not take a step further and apply for our CREST approved Vulnerability Assessment and Penetration Testing. Let us assist you in identifying any possible cracks in your security and offer you solutions to help seal those breaches from nasty attackers.


Or contact us at