Quantcast
Channel: » Security Policies
Browsing all 12 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

An Internet of Criminals

The world of cyber-crime has grown so much in these past few years due to the explosion of growth with respect to the number of internet users the world over. It has not only expanded on the side of...

View Article



Image may be NSFW.
Clik here to view.

Scheduling Change of Passwords

If you are in charge of network security, one thing you may want to consider as far as laying down the law in safeguarding your network is the regular change of user passwords to avoid potential...

View Article

Image may be NSFW.
Clik here to view.

Be Wary of Giving out Your Email Address

Emails are supposed to make life easier but sometimes, it may be wise to choose who you give out your email to. Today, a lot of mischief can be done and normally this comes in forms of email attacks...

View Article

Image may be NSFW.
Clik here to view.

Cyber Wars: A Lost Cause

We know for a fact that the battle towards malicious software and viruses released on the web has caused a lot of pain as far as pinpointing and remedying them but apparently nothing has been done to...

View Article

Image may be NSFW.
Clik here to view.

Biometrics + Physical security = Next best thing to unbreakable?

Biometrics is seen as the next step in computer systems security and access control due to the failure of more primitive and fundamental security systems. Fingerprint scanners, passwords, security...

View Article


Image may be NSFW.
Clik here to view.

Complacency – the IY industry’s Worst Enemy

This has been proven true by incidents broadcast around the world in minutes or hours after they have happened. Many have suffered the consequences of such incidents in the UK, US and mostly each and...

View Article

Image may be NSFW.
Clik here to view.

Telecommuting Woes???

Research has shown that a survey conducted within a large company shows that although telecommuting is very much productive for many firms it tends to be on the downside for those employees who do stay...

View Article

Image may be NSFW.
Clik here to view.

IT Security Policy for Employees

Information technology or IT continues to serve the needs of a business from start to the processes of change that it is required to go through as it expands.  It is a necessary occurrence for...

View Article


Image may be NSFW.
Clik here to view.

Levels of Confidentiality

Information that is sought to be protected by companies is typically categorized into different levels of confidentiality.  Confidentially pertains to the prevention of disclosing information to...

View Article


Image may be NSFW.
Clik here to view.

Information Governance

  Before there was a Bill Gates or a Steve Jobs, most companies relied on typed records, carbon copies and hand-written notes to store data and valuable information. If the boss needed to check an...

View Article

Image may be NSFW.
Clik here to view.

IT Security As Related To the Real Estate Industry

Information technology in general is important across basically all industries these days. But, because there are different types of sensitive information, and different ways that information can be...

View Article

Image may be NSFW.
Clik here to view.

Keeping Yourself Safe in a Technological World

Unfortunately, every day there are new threats that make themselves known in the world. Even though there are many that have been foiled in their attempts to steal, kill and destroy, there are even...

View Article
Browsing all 12 articles
Browse latest View live




Latest Images