Secure your wireless router before it is too late

Most of us use wireless routers at office and home. While the office routers are generally secured (hopefully), most home routers are provided by broadband operators wih default configurations and passwords.  In a worst case it may happen that these are set as unsecured. There is increasing risk of an intruder using an unsecured network or hacking into a home wireless network and sending out malicious mails. Continue reading “Secure your wireless router before it is too late”

Securing information through Identification, Authentication and Authorisation

Authentication is a critical component of the access control mechanisms implemented by organizations to secure information. Underlying principle of logical access control is to identify whether a user is in fact the right person whom he claims to be and provide the right type of access to that person. Continue reading “Securing information through Identification, Authentication and Authorisation”

Data Breach Involving Financial Data

Financial Institutions have always been highly susceptible to data breaches and as per indicators the first half of 2010 has not been any different. Already 39 breaches have been reported by Financial Institutions, and considering that reported breaches form a tip of the iceberg in relation to total breaches, actual breaches are expected to be significantly higher. Continue reading “Data Breach Involving Financial Data”

Qadit moves to a newer and bigger premises

On the strength of the long standing and excellent relationship with our valued clients, associates, ecosystem partners and friends, Qadit Systems and  group entities have grown both in terms of service offerings and service quality.

This has necessarily added to another dimension-  the quantum of human resources in our fold.

With a view to constantly raising the bar as far as client deliverables go and as a concomitant, providing the right ambience for our human resources to serve you, we have moved to bigger premises supported by stateof- the- art infrastructure at :

1st Floor, Balammal Building (above Canara Bank)

33, Burkit Road, T.Nagar

Chennai 600 017

Phone:  044-42791150 to 52, 6547 7225

Fax: 044-42791149

Benefits & Risks of moving Federal Information Tech into the Cloud: A GAO Report

The US Government Accountability Office (GAO) did a study on the benefits and risks of moving federal information technology into the cloud and released a report titled ‘Governmentwide Guidance Needed to Assist Agencies in Implementing Cloud Computing’ summarizing it’s findings.
Continue reading “Benefits & Risks of moving Federal Information Tech into the Cloud: A GAO Report”

How to connect to a remote PC over internet? – Part 1

You can connect to your work computer from your home computer and have access to all of your programs, files, and network resources as though you were in front of your computer at work. You can leave programs running at work and when you get home, you will see your work computer’s desktop displayed on your home computer, with the same programs running. You will need “Remote Desktop Connection” (RDC). Continue reading “How to connect to a remote PC over internet? – Part 1”