Tag: Encryption
September 23, 2024 |
What Is PGP Encryption and How Does It Work?
You’re working late Thursday evening as a contractor for a powerful government agency. You stumble across classified documents uncovering a surveillance program that invades the privacy of millions of citizens. Your heart races as you decide to expose this to the masses and enlist the help of a...
March 3, 2015 |
4 Ways to Avoid Malware Like Lenovo Superfish
PCs sold by Lenovo between September 2014 and January 2015 came pre-installed with Superfish VisualDiscovery, a piece of malware claiming to improve users’ Internet experience by adding visual results to Google search and other websites. But in reality, the main purpose of the software was to add...
December 18, 2014 |
Ten Simple Ways to Prevent Security Breaches in Windows Server 2012
Windows Server is one of the most commonly deployed critical systems in the organization. Most of the applications used in the organization are also Windows based, plus there are other legacy applications built on these Windows platforms. Since these servers are used the most, they need to be...
November 25, 2014 |
Ten Simple Ways to Prevent Security Breaches in Windows File Server 2012
File server is the central location in any network containing all kinds of information which is saved and shared by users within the organization. There is no restriction on the type of information used and shared. Since it is one of the most common reach out place for the users in the...
August 14, 2014 |
Avoid Data Breaches: Top Five Tips
It is hard to keep up with all of the various computer security incidents occurring daily. One can't help but wonder if more incidents are being reported and spreading through social media and internet news or if more incidents are taking place. It is likely both. The good news is, over the last...
April 22, 2014 |
Heartbleed: A Common-Sense Approach to a Real Network Problem
You’ve probably heard all about the Heartbleed vulnerability by now. Although it might not mean the total collapse of the Internet, as initial wild reports suggested, it’s also not something you can simply ignore. There are definitely some steps business IT departments should take to ensure...