(This is an extract from the original article appearing in Information Week)
The benefits of cloud computing make it hard to resist for both big and small businesses. However security in the cloud is still a stumbling block for most organisation in considering the adoption of cloud computing.
Continue reading “Cloud Security”
Network Printers are so commonly used that they are no longer considered computing accessories but more as office appliances. At first thought, applying security to network printers may seem superfluous and unnecessary. But Printers today are complex network devices that require careful consideration regarding security. Continue reading “Securing the Network Printer”
As per a recent statistic, about a million mobile handsets are getting lost every year. While mobile phones carry valuable data such as business contacts, emails, documents, pictures, videos, etc. and senior management executives are increasingly using their smart phones compared to laptops, securing mobile phones is not given top priority in the IT security agenda of many business organizations. It is highly recommended that every organization includes a ‘Mobile Phone Security Policy’ in their IT Security Policy and Procedures. The policy may include a security checklist similar to the one given below. Continue reading “Checklist to secure data in mobile phones”
The increased usage of internet has brought along with it a wide array of security concerns. Just as how a system and its data can get infected by virus, websites can also get infected with Trojans, virus, malware, adware, injection attacks etc. In this article let’s gain an understanding of how to ensure that one visits a secured and safe website. Continue reading “Are you visiting secured websites?”
Virtualization is a buzzword that has been doing the rounds for a couple of years now. Does it really help organizations and how?
Continue reading “Virtualization – How you can benefit”
In recent months, there is a lot of buzz about Endpoint Security. So what is Endpoint Security … and why the fuss?
End point security is an IT security concept that makes each device (end point) responsible for its own security. Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed.
Continue reading “Endpoint Security – What is the fuss all about?”
Qadit Systems and Solution(Qadit) has been empanelled with CERT-In as a qualified IT Security Auditing organisation upto April 30, 2012. We have also been empanelled by the Controller of Certifying Authorities (CCA) as an auditor under the Information Technology Act, 2000 for conducting the technical and physical infrastructure audits of the Certifying Authorities. This empanelment is valid upto September 23, 2011.
Continue reading “Empanelment with CERT-In and with Controller of Certifying Authorities (CCA)”