Information Security experts recommend that password length should be minimum 8 characters and should have a mix of alphabets (lower and upper case), numerals and special characters. What happens if a user has a password of a lower strength? In this article, you can check how strong your password is. Continue reading “How secure is your password?”
Employee IT Security behavior turns worse
A new study released by the Ponemon Institute reveals that there is a general lack of awareness and enforcement of computer security policies at many companies. The rate of non-compliant employee behavior appears to be getting worse over time. Continue reading “Employee IT Security behavior turns worse”
10 Steps To Secure Remote Access Software
Remote access software has many useful areas of application like internal IT support, vendor support for software / hardware, accessing office computer from home pc, webinars, etc. However, remote access usage comes with a plethora of security concerns. In this article, I am enlisting some of the basic security measures to be taken by users of remote access software to protect their information assets. Continue reading “10 Steps To Secure Remote Access Software”
Tech Terminology Demystified – SQL Injection
SQL injection is an attack on a web server which targets the database the web application is talking to. The aim of the attack is to trick the database server to run queries constructed by the attacker. These attacks can even effect database update or delete transactions.
Continue reading “Tech Terminology Demystified – SQL Injection”
Webscarab – A Beginner’s Guide
A HTTP proxy can help you analyse the data that is sent back and forth between your browser and the websites you visit. It sits between your browser and the website you are visiting and it will hand you all the information that the browser is sending to the website. You have the option to even change the data that is being sent.
Backup Types and Backup Rotation Strategy
On the basis of data coverage, backups are of 3 types viz., full backup, differential backup and incremental backup. The following table gives a brief description of each backup type and also compares the backups in terms of backing up speed, restoration speed and storage space required.
Continue reading “Backup Types and Backup Rotation Strategy”
Cardinal Rule in IT Security – Remove admin rights for end users
In many organizations, End users are generally found to have administrative privileges over their desktops and laptops. But this could turn out to be one of the most potent IT security risk faced by the organization. Continue reading “Cardinal Rule in IT Security – Remove admin rights for end users”
It doesn’t matter where the weakest link is as long as it exists.
Day in and out we are reading and listening to news about how lost and stolen data, Virus attacks crippling organizations, unauthorized software that may contain malwares and so on. While it is impossible to eliminate IT risks altogether, certain steps can aid in placing less reliance on the persons and processes and more on technology. At the end of the day it is better to Push Security to End Users than to expect compliance. Continue reading “It doesn’t matter where the weakest link is as long as it exists.”
Increasing threats from Malwares – Controls
Malwares are malicious softwares that are created with a intention to damage information processing facilities. It is different from error in software which may cause the same end result but is not intentional. Malwares are written with a specific purpose to cause damage. What are the controls you can use for protection
Continue reading “Increasing threats from Malwares – Controls”
A History of Public Key Cryptography
Public key cryptography as we know it is actually the outcome of efforts to solve a major issue with symmetric encryption systems (such as the DES)-key distribution. Concepts such as private key and public key represent the final step in the solution to the problem of key distribution. Continue reading “A History of Public Key Cryptography”