FIVE steps to keeping your tablets and phones

Smart phones and tablets needs more protection than desktops Switch on PIN/password protection/fingerprint recognition for mobile devices Configure devices so that when lost or stolen they can be tracked, remotely wiped or remotely locked Keep your devices and apps installed up to date using the automatically update option When sending…

Continue reading

What is Whaling?

Whaling is a specific kind of phishing targeted at high-ranking bankers, executives or others in powerful positions or job titles. This highly targeted phishing attacks (masquerading as legitimate emails) that are aimed at senior executives. Those who are engaged in whaling may, for example, hack into specific networks where these…

Continue reading

World of DevOps

Definition DevOps is a term used to refer to a set of practices that emphasize the collaboration and communication of both software developers and information technology professionals while automating the process of software delivery and infrastructure changes. DevOps emerged from an effort by businesses to respond more rapidly to market…

Continue reading

When is a technology matured?

For the new technology, the key factor is how quickly its ecosystem becomes sufficiently developed for users to realize the technology’s potential.In the case of cloud-based applications and storage, for example, success depended not just on figuring out how to manage data in server farms, but also on ensuring the…

Continue reading

IDS-IPS-SIEM on corporate network

Intrusion Detection System (IDS), Intrusion Prevention System (IPS) and Security information and event management (SIEM) tools are critical part of a corporate or enterprise network. An Intrusion Detection System (IDS) monitors network traffic and monitors for suspicious activity and alerts the system or network administrator. There are network based (NIDS)…

Continue reading

Shadow IT- the ignored threat

Shadow IT, the use of technology systems and solutions without the explicit approval of the organization. Shadow IT is happening right now in your organization, you just don’t know it. Your data is at risk, or could even be breached already, and you don’t know it. At least not yet.…

Continue reading