Copy and Paste is not working on my Remote Desktop Connection… what’s wrong?

How to troubleshoot copy and paste problems when connected to a remote machine. A very annoying occurrence that I sometimes suffer is when all of a sudden the copy and paste function stops working when I am connected to a remote machine.

Continue reading

Top 10 Security Precautions when using Social Networking Sites

It is impossible and illegal to stop employees from using social networking sites 24/7 and even if it were legal it wouldn’t be a good idea as it could easily alienate your employees. The best course of action is to educate your employees about the best way to stay safe on social networks. Below is […]

Continue reading

Weakening security is always a bad idea

SSL security issues have once again made the news. One might go as far as to say that SSL is the black sheep of the computer industry, the one everyone likes to pick on.

Continue reading

Why we strive for security excellence

If you care about what you do, you will always strive to make it better. You will go the extra mile to ensure the product or service is at its best and striving for excellence will come naturally

Continue reading

An ode to open source and freeware developers

If the sharing of software wasn’t enough, open source developers also share their source code. It’s time we start appreciating what they have done for the IT industry.

Continue reading

An unusual bring your own device story

Security professionals have often cautioned organizations who allow their employees to bring their own mobile devices and then plug them into the network.

Continue reading

Who is this man-in-the-middle?

Man-in-the-middle (MITM) attacks are everywhere. If you’re a security professional you’re surely very well acquainted with them and if you’re just starting out this won’t be the last time you hear of MITM attacks.

Continue reading

Cybersecurity awareness: a waste of time?

We spend a lot of time talking about patch management, vulnerabilities and policies, yet we seldom talk about an important aspect of security; the people on your network.

Continue reading

Profitable Hacking

There are many reasons why people start hacking. Some do it for the thrill; others do it as a learning experience. Some do it for money. So how do hackers make their money?

Continue reading

The Pitfalls of Interpreting Vulnerability Data

There is no way to determine a platform’s security based on raw data, as that data needs to first be put into context, applied to a scenario, and interpreted

Continue reading