Category Archives: Best Practices

5 Ways to Protect your Phone from Security Threats

phone secure login protection concept illustration

The implications of a lost cell phone go much deeper than the inconvenience (and expense) of replacing that brand-new iPhone 5. Unless you’ve been careful, you could lose inestimable sensitive information — from contact info to emails, passwords, access to

What Makes Computers Slow Down?

It is inevitable that a computer will slow down over time, but the extent to which your computer slows is dependent upon the types of activities that you engage in, the hardware you have installed, and the type of software

tunCERT Raise the Cyber Threat Level

Following latest conditions that exist on the cyber space with expectation of new attacks and threats the Tunisian CERT raised the Alert indicator to the second level. Which mean that there is a moderate risk rating for all cyber users

The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Monthly Report

The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) released their monthly monitor report in collaboration with US-CERT, the report focus to assist the community with ways to secure and protect their environment. If we look at the report it

Using mod_rewrite to harden Apache

Most installations of Apache should come with the mod_rewrite module already configured and active.  For those of you that are hosting the web server on a shared hosting environment (ie: you’ve bought a generic web hosting package), then you are

The Cloud Security Rules Book

The Cloud Security Rules book is available on Amazon.com and selected book stores from October 2011. This book targets decision makers in organizations worldwide. Whether you run a small company, is the president of a global NGO, or the CISO

10 steps To Protect MS Based System This Summer

Protecting your systems against all manner of intrusions will provide more safety for your virtual life, by using complex passwords and a regular file check against changes, plus restricting anything and everything will keep these threats away. We are now