Archive for the ‘Best Practices’ Category

phone secure login protection concept illustration

5 Ways to Protect your Phone from Security Threats

The implications of a lost cell phone go much deeper than the inconvenience (and expense) of replacing that brand-new iPhone 5. Unless you’ve been careful, you could lose inestimable sensitive information — from contact info to emails, passwords, access to all your social networking sites and even financial information. Intelligent identity thieves can take the [...]

Share

What Makes Computers Slow Down?

It is inevitable that a computer will slow down over time, but the extent to which your computer slows is dependent upon the types of activities that you engage in, the hardware you have installed, and the type of software installed for your particular user experience. New hardware, software, and internet interactions have increasing power [...]

Share

tunCERT Raise the Cyber Threat Level

Following latest conditions that exist on the cyber space with expectation of new attacks and threats the Tunisian CERT raised the Alert indicator to the second level. Which mean that there is a moderate risk rating for all cyber users and they need to be more vigilant while using their system. A list of best [...]

Share

The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Monthly Report

The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) released their monthly monitor report in collaboration with US-CERT, the report focus to assist the community with ways to secure and protect their environment. If we look at the report it is stated the increase of highly sophisticated malwares that are targeting different operating and industrial [...]

Share

Using mod_rewrite to harden Apache

Most installations of Apache should come with the mod_rewrite module already configured and active.  For those of you that are hosting the web server on a shared hosting environment (ie: you’ve bought a generic web hosting package), then you are forced to edit a file named .HTACCESS in order to setup the securities for your [...]

Share

The Cloud Security Rules Book

The Cloud Security Rules book is available on Amazon.com and selected book stores from October 2011. This book targets decision makers in organizations worldwide. Whether you run a small company, is the president of a global NGO, or the CISO of a well-known brand – this book brings you relevant knowledge about security in the [...]

Share

10 steps To Protect MS Based System This Summer

Protecting your systems against all manner of intrusions will provide more safety for your virtual life, by using complex passwords and a regular file check against changes, plus restricting anything and everything will keep these threats away. We are now at the summer season and at this time we travel and move from one location [...]

Share