Information Security experts recommend that password length should be minimum 8 characters and should have a mix of alphabets (lower and upper case), numerals and special characters. What happens if a user has a password of a lower strength? In this article, you can check how strong your password is. Continue reading “How secure is your password?”
Tech Terminology Demystified – Cross Site Request Forgery
A CSRF attack forces a logged-on victim’s browser to send a request to a vulnerable web application, which then performs the chosen action on behalf of the victim. The malicious code is often not on the attacked site. This is why it is called “Cross Site”.
Continue reading “Tech Terminology Demystified – Cross Site Request Forgery”
What is Cloud Computing
Cloud computing is getting tons of press these days. Big names such as IBM , Amazon are already in the market with service offerings.So what exactly is cloud computing and how does it work.
Employee IT Security behavior turns worse
A new study released by the Ponemon Institute reveals that there is a general lack of awareness and enforcement of computer security policies at many companies. The rate of non-compliant employee behavior appears to be getting worse over time. Continue reading “Employee IT Security behavior turns worse”
Utilities : Open xlsx, docx and pptx files
Free converter to open, edit and save Microsoft Office Excel, Word and PowerPoint 2007 files from within earlier versions of Microsoft Office.
Size : 27.5 MB
Download link:
Microsoft says “Think like an attacker”
Microsoft’s “IT Infrastructure Threat Modeling Guide” offers security advice.
Microsoft offers up security advice on how to fend off attacks against corporate IT resources by looking at ways that attackers can undermine an organization in its “IT Infrastructure Threat Modeling Guide”.
10 Steps To Secure Remote Access Software
Remote access software has many useful areas of application like internal IT support, vendor support for software / hardware, accessing office computer from home pc, webinars, etc. However, remote access usage comes with a plethora of security concerns. In this article, I am enlisting some of the basic security measures to be taken by users of remote access software to protect their information assets. Continue reading “10 Steps To Secure Remote Access Software”