Page 2

The Secret Question Threat

At its core, security is all about allowing convenient access to a system for all those who have legitimate access to it. Yet, at the same time, that convenience, in turn, also creates security risks.

Continue reading

23 network security mistakes that could get you fired

Depending on your boss, the impact to company or customer and seriousness of a mistake, some can be career-limiting or, even worse, send you back to the job market before you even know it. Let’s take a look at those network security mistakes that could get you fired.

Continue reading

Security 101: Authentication (Part 1)

In this post, we’re going to look at the first of the three As: Authentication. We’re going to focus on authentication as confirming a user.

Continue reading

The exam nearly every employee will fail

We put together 10 easy questions and the answers we suspect most users would give – to the horror of the any sysadmin tasked with correcting the papers.

Continue reading

The 26 worst security threats of 2014

As 2014 draws to a close, let’s take a look back at the 26 worst security threats of 2014.

Continue reading

Security 101: at rest or in transit – protecting data with encryption

In previous articles, we discussed encryption and the algorithms used. In this one we take a look at their practical application.

Continue reading

Cyber-Insurance: Is it necessary? Should it be mandatory?

Should businesses consider buying cyber insurance or is it yet another insurance that’s unnecessary?

Continue reading

Security 101 – Algorithms

In this post we take a look at the encryption algorithms that are in common use today and those that are no longer in vogue. We’ll also see how encryption can be used both to obscure and to validate data and when you want to use one type of algorithm over another.

Continue reading

Security 101 – Encryption terminology

One of the first things that comes to mind when talking about security is encryption. Encryption can be used to provide confidentiality and integrity, which are two of the three main tenets behind security. To be sure that you are familiar with the concepts we will be covering in upcoming articles, here is a primer on encryption terminology.

Continue reading

Embrace the cloud without compromising security

GFI WebMonitor’s inbuilt understanding of the most popular web-based applications and cloud services can help sysadmins enforce policy and protect users.

Continue reading

Find us on Facebook

Follow us on Twitter