Archive for the ‘Network security’ Category

cyber security

Network Security vs. Endpoint Security: Which Matters More?

_Cyber attacks affect 556 million victims per year, which amounts to 1.5 million victims per day and 18 victims per second. When funds are illegally stolen from a business or personal bank account, they’re only recoverable 22 percent of the time. As of 2013, the average global cost of cyber crime is over $100 billion [...]

Share

5 Critical Security Concerns That Every Sys Admin Should Check

IT departments may have a dedicated information security team or engineer whose primary responsibility is security, but each and every sys admin of any system on the network shares the responsibility for properly configuring and securing the systems in their charge. Network security software is a great tool to assist sys admins with locking down [...]

Share

Utilizing a Network Scanner – Best Practices

Your auditor, your boss, or maybe that great book on security you just read, has you thinking you want to use a network scanner to help with the security on your network, but you’re just not really sure where to begin. Take heart, in this article we will go over what you need to know [...]

Share

Internet Monitoring Software – 3 Reasons Why It’s More Brotherly Love, Than Big Brother

Are corporations snooping on their employees? Are privacy issues being breached when companies use Internet monitoring software? We take a look at this issue and its security implications to see if corporations are turning into Big Brother, or if this software is actually helping employees keep their jobs. The Internet is not a safe place. [...]

Share

7 Reasons Why You Need Internet Monitoring Software

Internet monitoring software should be part of any organization’s defense-in-depth strategy, and can provide your business with several web security benefits. This solution protects your users, your systems, your data, and by extension, your customers, by countering the web threats that come along when permitting your users Internet access. Here are the seven major reasons [...]

Share

Are you being sniffed? (Video)

Sniffing attack is widely used  to intercept users login and passwords, here is a short video by GFI about ways to protect your network from such type of attacks.

Share

BotHunter – Tracks and Isolate Network Malicious Threats

Today it is well-known that malwares and spams may bypass antiviruses and intrusion detection systems. if security software vendor did not develop the required signature for this attack than attacker will be able to execute the malicious software and take a full control of the corperate network. To stop the malicious activities at an early [...]

Share