Upgrade Now
Anything under the umbrella of IT Security, Computer Security, IT Controls
According to the latest edition of the Kroll Annual Global Fraud Report, theft of information and electronic data at global companies has overtaken physical theft of property and goods for the first time.
Continue reading “Theft of information and electronic data overtakes physical theft”
Wi-Fi Direct makes it happen!!
Wi-Fi Direct, formerly known as Wi-Fi Peer-to-Peer, is a set of software protocols that allow Wi-Fi devices to talk to each other without the need for wireless access points (hot spots).
The role of information security has not been clearly defined in many organizations and these organizations face challenges such as lack of senior management’s commitment to information security initiatives, poor security planning, integration issues between business goals and information security, issues relating to accountability for implementing, monitoring and reporting on information security and so on. Continue reading “Business Model for Information Security – What is it all about?”
In my previous article, I had covered some tips on shock-proofing ourselves against the loss of our mobile phones. In this article, we shall look at some tips to ensure that when the hard-drive of your laptop / PC crashes, the loss is only of a computing resource and not of your data.
DDOS has been gaining acceptance in recent days due to troubled economics, religion and political reasons. This checklist serves as a basic/intermediate reference source for IS professionals who wish to have their critical IT assets protected against Distributed Denial Of Service Attacks commonly known as ‘DDOS’.
Information may sometimes be disclosed to people for whom it is not intended. This usually does not bode well for information stake holders. Information may be disclosed either intentionally or unintentionally. Information can be disclosed unintentionally by social engineering, covert channels, malicious code etc. Accidental disclosure includes object reuse and emanation.
Continue reading “Gone with the Wind – Unauthorised Disclosure of Information”
Social Networking Sites such as Facebook, Twitter have become increasingly popular, but so has security issues specific to these sites. Continue reading “Security Threats through Social Networking Sites”
The past few weeks the media has been abuzz with news about the threatened banning of the popular Blackberry service. What is the security row all about?
Do you know that your hi-tech copier machine is secretly capturing your confidential information? Not many of us know that. But the fact is hi-tech copiers and multi-function printers / scanners come with hard disks which retain the images of the documents copied. Continue reading “Your spy is sitting in your office corner”