We are always under the impression that formatting of a HDD or USB removes the data permanently. But this is not the truth. Data on these media can be retrieved by special disk / file recovery utilities and laboratory attacks even after formatting. Let us see what the best method of sanitizing data is. Continue reading “How to sanitize data on hard disk drives, USBs , CDs and DVDs?”
The first International Risk Management Standard ISO 31000:2009, together with ISO Guide 73:2009, was released by the International Organisation for Standardisation (ISO) on 15 November 2009.
And since IT Security is an integral part of Risk Management, it is useful for anybody interested in IT Security to know the basics of this new Risk Management ISO Standard.
The use of smart phones to access sensitive corporate information away from the office is creating huge security gaps for enterprises. Smart phones are being used to access company mails and applications. Atleast one major breach involving theft of application code has been attributed to malware from smart phones. So how do we benefit from the technology while addressing the risks Continue reading “Smart Phones – Convenience or Threat?”
LMI is a governance enabler. Log data is no longer just the domain of technical personnel (traditionally used for trouble shooting). Log data is no longer just an IT asset and it is a corporate and business asset. It is used extensively by both management and external parties (auditor, forensic investigators) and hence has gained executive level visibility. In this post we look at the new approach to log management.
This article summarizes the key offences pointed out in the Information Technology Act, 2000 and includes amendments made in the year 2008.
Knowing these excel shortcuts takes you a long way in saving your valuable time while working with MS Excel.