At its core, security is all about allowing convenient access to a system for all those who have legitimate access to it. Yet, at the same time, that convenience, in turn, also creates security risks.
Continue readingAt its core, security is all about allowing convenient access to a system for all those who have legitimate access to it. Yet, at the same time, that convenience, in turn, also creates security risks.
Continue readingDepending on your boss, the impact to company or customer and seriousness of a mistake, some can be career-limiting or, even worse, send you back to the job market before you even know it. Let’s take a look at those network security mistakes that could get you fired.
Continue readingIn this post, we’re going to look at the first of the three As: Authentication. We’re going to focus on authentication as confirming a user.
Continue readingWe put together 10 easy questions and the answers we suspect most users would give – to the horror of the any sysadmin tasked with correcting the papers.
Continue readingAs 2014 draws to a close, let’s take a look back at the 26 worst security threats of 2014.
Continue readingIn previous articles, we discussed encryption and the algorithms used. In this one we take a look at their practical application.
Continue readingShould businesses consider buying cyber insurance or is it yet another insurance that’s unnecessary?
Continue readingIn this post we take a look at the encryption algorithms that are in common use today and those that are no longer in vogue. We’ll also see how encryption can be used both to obscure and to validate data and when you want to use one type of algorithm over another.
Continue readingOne of the first things that comes to mind when talking about security is encryption. Encryption can be used to provide confidentiality and integrity, which are two of the three main tenets behind security. To be sure that you are familiar with the concepts we will be covering in upcoming articles, here is a primer on encryption terminology.
Continue readingGFI WebMonitor’s inbuilt understanding of the most popular web-based applications and cloud services can help sysadmins enforce policy and protect users.
Continue reading