Smartphones must be treated with great care in order to avoid any type of unpleasant security issues: either device being stolen or data being online hacked. If you are not careful, losing the smartphone may result in more than only loss of phone numbers and contacts. We are talking about […]
Data security
Advantages and Disadvantages of Digital Signatures
I have often had to answer the question "what is digital signature technology?" Most times, the question has been asked by regular people, smart but not highly technical and often the best way to explain it is to draw parallels between electronic documents and paper documents. For example, when you […]
Best and Must-Have Free Antivirus Apps for Smartphones
According to the re-known research firm IDC, over 216 million smart phones have been shipped worldwide by manufacturers in the first three months of this year alone. The same study indicates that 51.6% of all mobile phones used are now smartphones. While for most people this is good news as […]
Educating End-Users on Where Not to Save Critical Documents
The terms "shared" or "network" folder probably don't mean much to the average office computer user. The perception of the computing world from a non-technologically oriented person is that it's getting so incredibly complex so quickly, that one could never even hope to keep up with the basics of everyday […]
Most Terrifying Online Threats
There’s no doubt that the Internet poses threats, despite all the excellent things it can do for us. Whether you’re on your phone, tablet, or computer, you need to watch out for the following four most terrifying online threats. 1. Trojan Horses A Trojan Horse is a type of malware […]
Ways to Remove Malicious Files from Your Computer
There are many good things about the internet, but it can also cause damage to your computer. You see, there are many websites that contain malicious files which can creep into your computer's system. When this happens and you don't act on it right away, your computer may not function […]
Microsoft Rolls Out Two-Factor Verification Across Its Services
Following the initiatives of Google and Apple to make Internet use safer against hackers, Microsoft is rolling out a two-factor authentication system across its online and desktop products. The optional security measure which will be available in the next few days covers all Microsoft accounts, including Outlook.com, Skype, SkyDrive, Office, […]
What is DCID 6/3
Standing for “Director of Central Intelligence Directive section 6, part 3”, DCID 6/3 represents the C&A (certification and accreditation) methodology used on intelligence projects by federal agencies like the C.I.A. Anyone working on such projects must have SCI clearance (SCI stands for Sensitive Compartmentalized Information). Before DCID 6/3 come to […]
NIST and NIACAP phases
NIST and NIACAP are two frameworks providing accountability for people involved in the security of the information system. They refer to verification and validation of security controls, system characterization and risk assessment as well as accrediting decisions and certification recommendations. NIST is a process designed to deal with unclassified information […]
DITSCAP phases
DITSCAP, developed by DISA (The Defense Information Systems Agency), serves for accrediting and evaluation of systems belonging to the Department of Defense. DITSCAP uses an infrastructure-centric approach for DoD systems. It is a mandatory element for all defense agencies for collecting, storing and processing information (either classified or unclassified). There […]
The Difference Between Crackers and Hackers
To understand the philosophy of a cracker vs. hacker, you must first understand the meaning of the two notions. There are differences between crackers and hackers considering the way they operate and their purposes. But let’s see. Upon me, the differentiation between the two notions is crystal-clear: – A cracker […]
How to Ensure Your WordPress Security
Surprisingly, it is extremely easy to get caught up in the day-to-day running of your web site. There are endless jobs that need your attention such as PPC, keyword searches, content writing, and link building. But, "Don't get caught with your pants down," when it comes to security. We have been trained […]