Checklist to secure data in mobile phones

As per a recent statistic, about a million mobile handsets are getting lost every year. While mobile phones carry valuable data such as business contacts, emails, documents, pictures, videos, etc. and senior management executives are increasingly using their smart phones compared to laptops, securing mobile phones is not given top priority in the IT security agenda of many business organizations. It is highly recommended that every organization includes a ‘Mobile Phone Security Policy’ in their IT Security Policy and Procedures. The policy may include a security checklist similar to the one given below. Continue reading “Checklist to secure data in mobile phones”

Some Interesting Articles and News collated from the Web – November 27, 2009

  • Shodan: Another Step Towards Intrusion as a Service Read more
  • Cloud computing pros and cons Read more
  • Top 5 Firefox add-ons: Security testing and assessmentRead more
  • New risk management ISO standardRead more
  • Cyberoam launches end point data protection solutionRead more
  • India embarks on e-tracking of crime projectRead more
  • Cyber terrorism next big threat to India: Cyber security whizkidRead more
  • GenApple – First Glance at the First Information BrokerageRead more
  • Gartner Identifies the Top 10 Strategic Technologies for 2010Read more
  • MicroSourcing offers SMB outsourcing solutionsRead more
  • Gartner lays out Top 10 strategic technologiesRead more
  • Windows Security Logs and MS Log ParserRead more
  • How to Carry Out Successful Cloud Governance and AdoptionRead more
  • Newest Zeus = NACHA: The Electronic Payments AssociationRead more
  • SaaS based accounting SW attracts Indian SMBsRead more

Some Interesting Articles and News collated from the Web – November 19, 2009

Endpoint Security – What is the fuss all about?

In recent months, there is a lot of buzz about Endpoint Security.  So what is Endpoint Security … and why the fuss?


End point security is an IT security concept that makes each device (end point) responsible for its own security.  Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed.


Continue reading “Endpoint Security – What is the fuss all about?”

Empanelment with CERT-In and with Controller of Certifying Authorities (CCA)

Qadit Systems and Solution(Qadit) has been empanelled with CERT-In as a qualified IT Security Auditing organisation upto April 30, 2012. We have also been empanelled by the Controller of Certifying Authorities (CCA) as an auditor under the Information Technology Act, 2000 for conducting the technical and physical infrastructure audits of the Certifying Authorities. This empanelment is valid upto September 23, 2011.

Continue reading “Empanelment with CERT-In and with Controller of Certifying Authorities (CCA)”