How to use Google Authenticator to secure access to desktops
We hear about high profile security breaches frequently. Most of these breaches exploit the system login credentials of end users to get into the company’s network. Therefor, Leading organizations are recognizing this and are beginning to focus on a better secure end user identities. The requirement of enforcing an additional authentication method is at all time […]
you can check the strength of your passwords using tools like this http://www.passwordmeter.com/
What is spyware
Spyware is a type of malicious software that is spread around on the internet. The term spyware is used to describe software that carries out certain behaviours or operations without obtaining user consent. Such behaviours include but are not limited to: advertising, personal information gathering, and even changing computer settings and configurations. Spyware can be […]
What is data exfiltration?
Data exfiltration is formally defined as the unauthorised transfer of sensitive information from a target’s system or network by an attacker to another location. Data is always moving around in network this makes it very hard to detect an exfiltration attack which makes it all the more serious and devastating. Such a transfer of data […]
use 2 factor authentication to be safe when accessing your e-mails or social media accounts on untrusted or public computers
As computer processing power increases the security of traditional passwords decreases due to vulnerability to what is known as dictionary attacks or brute force attacks. These are attacks where an attacker computer puts together a set of passwords and tries them out until your account is compromised. To face this threat the concept of password […]
Avoid entering sensitive data like your credit card numbers or any other financial or sensitive information into any public computer.
Always log out of websites by clicking “log out” on the site. It’s not enough to simply close the browser window or go to another website.
Password Manager Apps
Today you can’t live in the business world without spending some time online. Your online presence is secured by the passwords that secure your many accounts. The volume of the tragedy that can occur once any of your passwords is compromised needs no description. It is also a well established fact that you simply cannot have […]
6 IT Security Tips for Your Workplace
Today’s business are heavily reliant on information technology. Your workstation or PC has become an asset in addition to it being the tool through which your perform. Due to its importance it is very important for you to consider these tips on how to secure your workstation: Gear Up: It is very important from a […]