To Know
-
Lock down your data
Keep an eye out
CALL to Skills
Jul 2025
To Know
-
Lock down your data
Keep an eye out
CALL to Skills
Jul 2025
EDITION EDITORIAL & OVERVIEW
Lock down your data
#
63
CALL to Skills
-
Jul 2025

Large password data leak has been exposed!

In June 2025, experts discovered a huge data leak of over 16 billion passwords online. It was not due to one attack but years of malware that were stealing login credentials from infected computers. Major services like Google, Apple, Facebook, and GitHub were among the ones featured in the leak.

Therefore many are recommending users to take cybersecurity seriously, by employing secure measures such as turning on two-factor authentication, using password managers and changing their passwords that might be compromised.

If you wish to know more details and other recommendations for this leak, click here.

Word of the edition: Passkey

In 2025, “passkey” has become a popular term in cybersecurity. It’s a new way of logging in that doesn’t rely on passwords at all (aka. passwordless). Instead, it uses secure keys connected to your device, making the whole process safer, quicker, and easier. With billions of passwords recently leaked and more scams popping up such as phishing emails and AI-generated voices, passkeys are a powerful way to protect our online identity and stay one step ahead of cyber threats.

To know more about passkeys, click here.

Tips for sharing information with AI Chatbots:

  • Never share sensitive or confidential data. Avoid exposing source code, credentials, client info or internal documentation;
  • Treat AI chatbots as external services. Assume anything shared could be stored or analysed;
  • Redact and minimize context before sharing. Use placeholders and only include what’s strictly necessary;
  • Verify AI-generated suggestions before using them. Don’t blindly trust code, configs, or advice – be critical;
  • Avoid uploading full documents or logs. Share only relevant snippets to reduce risk;
  • Follow our internal policies. Stay aligned with internal guidelines and legal regulations;
  • In cases of doubts, it’s better to be safe than sorry, ask someone if what you’re sharing is safe or should be kept only inside our networks.

Join the challenge

Understanding what qualifies as personal or sensitive data is essential to staying compliant with GDPR regulations, especially when interacting with digital tools. This brief interactive section invites you to review common examples and spot data that needs protection. Whether you're writing emails, managing customer records, or chatting with AI tools like ChatGPT or Copilot, it's important to recognize when sensitive information is being shared.

Click here and join the challenge.

Information Security contacts

We have a dedicated Security team that works diligently to ensure the protection of oursystems, data, and the overall cybersecurity posture of the organisation.

Should you have any questions, concerns, or need assistance regarding security matters, our team is here to help. Contact us!

No items found.
No items found.

Large password data leak has been exposed!

In June 2025, experts discovered a huge data leak of over 16 billion passwords online. It was not due to one attack but years of malware that were stealing login credentials from infected computers. Major services like Google, Apple, Facebook, and GitHub were among the ones featured in the leak.

Therefore many are recommending users to take cybersecurity seriously, by employing secure measures such as turning on two-factor authentication, using password managers and changing their passwords that might be compromised.

If you wish to know more details and other recommendations for this leak, click here.

Word of the edition: Passkey

In 2025, “passkey” has become a popular term in cybersecurity. It’s a new way of logging in that doesn’t rely on passwords at all (aka. passwordless). Instead, it uses secure keys connected to your device, making the whole process safer, quicker, and easier. With billions of passwords recently leaked and more scams popping up such as phishing emails and AI-generated voices, passkeys are a powerful way to protect our online identity and stay one step ahead of cyber threats.

To know more about passkeys, click here.

Tips for sharing information with AI Chatbots:

  • Never share sensitive or confidential data. Avoid exposing source code, credentials, client info or internal documentation;
  • Treat AI chatbots as external services. Assume anything shared could be stored or analysed;
  • Redact and minimize context before sharing. Use placeholders and only include what’s strictly necessary;
  • Verify AI-generated suggestions before using them. Don’t blindly trust code, configs, or advice – be critical;
  • Avoid uploading full documents or logs. Share only relevant snippets to reduce risk;
  • Follow our internal policies. Stay aligned with internal guidelines and legal regulations;
  • In cases of doubts, it’s better to be safe than sorry, ask someone if what you’re sharing is safe or should be kept only inside our networks.

Join the challenge

Understanding what qualifies as personal or sensitive data is essential to staying compliant with GDPR regulations, especially when interacting with digital tools. This brief interactive section invites you to review common examples and spot data that needs protection. Whether you're writing emails, managing customer records, or chatting with AI tools like ChatGPT or Copilot, it's important to recognize when sensitive information is being shared.

Click here and join the challenge.

Information Security contacts

We have a dedicated Security team that works diligently to ensure the protection of oursystems, data, and the overall cybersecurity posture of the organisation.

Should you have any questions, concerns, or need assistance regarding security matters, our team is here to help. Contact us!

No items found.
No items found.

Large password data leak has been exposed!

In June 2025, experts discovered a huge data leak of over 16 billion passwords online. It was not due to one attack but years of malware that were stealing login credentials from infected computers. Major services like Google, Apple, Facebook, and GitHub were among the ones featured in the leak.

Therefore many are recommending users to take cybersecurity seriously, by employing secure measures such as turning on two-factor authentication, using password managers and changing their passwords that might be compromised.

If you wish to know more details and other recommendations for this leak, click here.

Word of the edition: Passkey

In 2025, “passkey” has become a popular term in cybersecurity. It’s a new way of logging in that doesn’t rely on passwords at all (aka. passwordless). Instead, it uses secure keys connected to your device, making the whole process safer, quicker, and easier. With billions of passwords recently leaked and more scams popping up such as phishing emails and AI-generated voices, passkeys are a powerful way to protect our online identity and stay one step ahead of cyber threats.

To know more about passkeys, click here.

Tips for sharing information with AI Chatbots:

  • Never share sensitive or confidential data. Avoid exposing source code, credentials, client info or internal documentation;
  • Treat AI chatbots as external services. Assume anything shared could be stored or analysed;
  • Redact and minimize context before sharing. Use placeholders and only include what’s strictly necessary;
  • Verify AI-generated suggestions before using them. Don’t blindly trust code, configs, or advice – be critical;
  • Avoid uploading full documents or logs. Share only relevant snippets to reduce risk;
  • Follow our internal policies. Stay aligned with internal guidelines and legal regulations;
  • In cases of doubts, it’s better to be safe than sorry, ask someone if what you’re sharing is safe or should be kept only inside our networks.

Join the challenge

Understanding what qualifies as personal or sensitive data is essential to staying compliant with GDPR regulations, especially when interacting with digital tools. This brief interactive section invites you to review common examples and spot data that needs protection. Whether you're writing emails, managing customer records, or chatting with AI tools like ChatGPT or Copilot, it's important to recognize when sensitive information is being shared.

Click here and join the challenge.

Information Security contacts

We have a dedicated Security team that works diligently to ensure the protection of oursystems, data, and the overall cybersecurity posture of the organisation.

Should you have any questions, concerns, or need assistance regarding security matters, our team is here to help. Contact us!

No items found.
No items found.
Go Back
Let Us Know Your Thoughts About Our Newsletter!
Start by
Saying Hi!
© 2024 Celfocus. All rights reserved.
Let Us Know Your Thoughts About Our Newsletter!
Start by
Saying Hi!
© 2025 Celfocus. All rights reserved.
40
75
25-years-of-talent-63
40
lock-down-your-data
70
out-there-63
45
get-along
30
duolingo
25
babies
15
time-to-fight
50
vodafone-tv-finops
98
lifelong-learner
90
sar-bet-cognitive-for-business-growth
60
inclusive-hiring-celfocus
100
figuring-it-out
99
troubleshooter
35
digital-assistant