Category Archives: Best Practices

Don’t Give Up on the Cloud Just Yet: How to Secure Your Digital Information

shutterstock_216094468

With the recent hacking of iCloud and the release of nude photos of celebrities, everyone is more concerned than ever about cloud security. A lot of people started asking, if this can happen to famous people with enough money to

Security Breach Attacks On Industrial Computers

All too often, network or security administrators only often focus on the security of regular computers, servers, and networks because these often contain sensitive information. By contrast, industrial computers tend to be overlooked when it comes to security. They are

5 Ways to Protect your Phone from Security Threats

phone secure login protection concept illustration

The implications of a lost cell phone go much deeper than the inconvenience (and expense) of replacing that brand-new iPhone 5. Unless you’ve been careful, you could lose inestimable sensitive information — from contact info to emails, passwords, access to

What Makes Computers Slow Down?

It is inevitable that a computer will slow down over time, but the extent to which your computer slows is dependent upon the types of activities that you engage in, the hardware you have installed, and the type of software

tunCERT Raise the Cyber Threat Level

Following latest conditions that exist on the cyber space with expectation of new attacks and threats the Tunisian CERT raised the Alert indicator to the second level. Which mean that there is a moderate risk rating for all cyber users

The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Monthly Report

The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) released their monthly monitor report in collaboration with US-CERT, the report focus to assist the community with ways to secure and protect their environment. If we look at the report it

Using mod_rewrite to harden Apache

Most installations of Apache should come with the mod_rewrite module already configured and active.  For those of you that are hosting the web server on a shared hosting environment (ie: you’ve bought a generic web hosting package), then you are