An Internet of Criminals
The world of cyber-crime has grown so much in these past few years due to the explosion of growth with respect to the number of internet users the world over. It has not only expanded on the side of...
View ArticleScheduling Change of Passwords
If you are in charge of network security, one thing you may want to consider as far as laying down the law in safeguarding your network is the regular change of user passwords to avoid potential...
View ArticleBe Wary of Giving out Your Email Address
Emails are supposed to make life easier but sometimes, it may be wise to choose who you give out your email to. Today, a lot of mischief can be done and normally this comes in forms of email attacks...
View ArticleCyber Wars: A Lost Cause
We know for a fact that the battle towards malicious software and viruses released on the web has caused a lot of pain as far as pinpointing and remedying them but apparently nothing has been done to...
View ArticleBiometrics + Physical security = Next best thing to unbreakable?
Biometrics is seen as the next step in computer systems security and access control due to the failure of more primitive and fundamental security systems. Fingerprint scanners, passwords, security...
View ArticleComplacency – the IY industry’s Worst Enemy
This has been proven true by incidents broadcast around the world in minutes or hours after they have happened. Many have suffered the consequences of such incidents in the UK, US and mostly each and...
View ArticleTelecommuting Woes???
Research has shown that a survey conducted within a large company shows that although telecommuting is very much productive for many firms it tends to be on the downside for those employees who do stay...
View ArticleIT Security Policy for Employees
Information technology or IT continues to serve the needs of a business from start to the processes of change that it is required to go through as it expands. It is a necessary occurrence for...
View ArticleLevels of Confidentiality
Information that is sought to be protected by companies is typically categorized into different levels of confidentiality. Confidentially pertains to the prevention of disclosing information to...
View ArticleInformation Governance
Before there was a Bill Gates or a Steve Jobs, most companies relied on typed records, carbon copies and hand-written notes to store data and valuable information. If the boss needed to check an...
View ArticleIT Security As Related To the Real Estate Industry
Information technology in general is important across basically all industries these days. But, because there are different types of sensitive information, and different ways that information can be...
View ArticleKeeping Yourself Safe in a Technological World
Unfortunately, every day there are new threats that make themselves known in the world. Even though there are many that have been foiled in their attempts to steal, kill and destroy, there are even...
View Article
More Pages to Explore .....