Floating Workforce – A Risk For Your Business
Over the past few decades, liberation of data and the ways to stage-manage it has come with numerous benefits to the users that frequently deal with chunks of data every day. With the advantage of …
Information and Technical Knowledge for General Security Understanding.
Over the past few decades, liberation of data and the ways to stage-manage it has come with numerous benefits to the users that frequently deal with chunks of data every day. With the advantage of …
Viruses are like nasty little hitch hikers. Thumbing up to get a ride on your computers, they smartly make their little way in by attaching links in emails and instant messages and throw them to …
The number of recent data breach incidents has shattered much of security protocol claims of user data and information protection in the digital world. It is an understood fact that when it comes to data …
Forwarded emails containing a joke, motivational story, a recent update on a natural calamity or a warning about the recent hoax has become quite a common practice these days. I’m sure; many of you might …
This article takes a view of today’s authentication methods and reasons on why using password-protection as a data security option is still relevant in today’s environment. Various observations in the past have reaffirmed the importance …
The constant change of information in the world and the frolics of groups like Anonymous and LulzSec over the past few months have only but assured data breaches to be an inevitable truth. If companies …
Encryption is the process of altering plaintext information using an algorithm (AES) to make it unreadable except to those who have a key that unlocks the encryption. This process will encrypt the information and provides …
Recent publicly available data reports various data-breach incident costs to continue to rise. The latest figures according to the Ponemon Institute put the value of these incidents at more than $214 per compromised record with …
The global interconnection of different elements on the Internet has made insider threat to organization data a reality. Most often, the insider threat scenario may not even involve having direct access to the computer system …
Given the many motivations that seem to remain the same, insider threats to an organization can be separated into three exclusive types. The following may help security advisors and information security personnel in staying up …