Gavin is a Cyber Security Consultant from Jamaica.

He is helping companies and individuals around the world to protect their digital assets.
Professional profile

Let's face it, attackers can be relentless. Cyber Security requires proactive and reactive defences like many other aspects of life.

Let's build a strong security structure which works to support the enterprise.

You can view a Portfolio of Gavin's efforts here

Do You Have Questions?

A list of frequently asked questions to help you understand how it works.

1. What is Cyber Security?

Cyber Security is the practice of protecting systems, networks, and programs from digital attacks. These attacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes. Source: https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html

2. What is the difference between vulnerability, threat, and risk?

Vulnerability (weakness) is a gap in the protection efforts of a system, a threat is an attacker who exploits that weakness. Risk is the measure of potential loss when that the vulnerability is exploited by the threat e.g. Default username and password for a server – An attacker can easily crack into this server and compromise it. Source: https://www.greycampus.com/blog/information-security/top-cyber-security-interview-questions

3. What is the BEST way to protect my network?

There isn’t necessarily a “best” way. The smartest proven way is to adopt a Defense-in-Depth security approach. A Defense-Depth security approach means implementing security controls at multiple layers of interaction which support each other to protect a computer system.

4. What is a Penetration Test?

A Penetration Test is an authorised simulated attack on a computer system to identify security weaknesses so they can be improved.

5. What is the difference between a Black Hat and a White Hat hacker?

Black Hat hackers are those who hack without authorisation. White Hat hackers are authorised to perform hacking exercises. Grey Hat hackers are White Hat hackers which sometimes perform unauthorised hacking activities.

6. Do you Freelance?

Currently, no, but I do volunteer my skills to help companies and people who contact me with issues. My volunteerism provides great value as it allows me to be completely unbiased in my support and everyone seems to really appreciate that.

Let's get in touch

Please share your thoughts, concerns, suggestions and ideas in the form below.