Not all hackers are criminals Post Views: 745 The term ‘hacking’ generally has a negative philosophy as many people assume that all hackers are bad, and they treat them with suspicion in the belief they have criminal intentions. To most people, though,...
Human Intelligence is the best defense against Phishing Attacks Post Views: 1,757 Social Engineering is the psychological manipulation of people into performing actions or divulging confidential information. When hackers combine this method, it does not require a...
Firewalls are no longer enough Post Views: 1,028 Firewalls operate by checking incoming and outgoing traffic against a set of rules. These rules might be based on metadata (e.g. port number, IP address, Protocol Type, etc..) or real data, i.e. the payload of the...
Your Data in the Cloud is not as secure as you think Post Views: 617 Many companies think they can leverage their existing security mechanisms in the Cloud, however, it is an entirely different aspect and must be looked from a different perspective with privacy in...
The Weakest Link in a Security Chain is the Human Element Post Views: 950 Advanced technology and security practices, no matter how sophisticated, will always be constrained by the human factor. No matter how strong your: • Firewalls • Intrusion Detection Systems •...
Two-Factor Authentication is not always Totally Secure Post Views: 2,437 Two-factor authentication is an extra level of security known as multi-factor authentication. It adds an extra step to the login process. Instead of only having to enter your username and...