_Cyber attacks affect 556 million victims per year, which amounts to 1.5 million victims per day and 18 victims per second. When funds are illegally stolen from a business or personal bank account, they’re only recoverable 22 percent of the time. As of 2013, the average global cost of cyber crime is over $100 billion [...]
Archive for the ‘Network security’ Category
IT departments may have a dedicated information security team or engineer whose primary responsibility is security, but each and every sys admin of any system on the network shares the responsibility for properly configuring and securing the systems in their charge. Network security software is a great tool to assist sys admins with locking down [...]
Your auditor, your boss, or maybe that great book on security you just read, has you thinking you want to use a network scanner to help with the security on your network, but you’re just not really sure where to begin. Take heart, in this article we will go over what you need to know [...]
Are corporations snooping on their employees? Are privacy issues being breached when companies use Internet monitoring software? We take a look at this issue and its security implications to see if corporations are turning into Big Brother, or if this software is actually helping employees keep their jobs. The Internet is not a safe place. [...]
Internet monitoring software should be part of any organization’s defense-in-depth strategy, and can provide your business with several web security benefits. This solution protects your users, your systems, your data, and by extension, your customers, by countering the web threats that come along when permitting your users Internet access. Here are the seven major reasons [...]
Sniffing attack is widely used to intercept users login and passwords, here is a short video by GFI about ways to protect your network from such type of attacks.
Today it is well-known that malwares and spams may bypass antiviruses and intrusion detection systems. if security software vendor did not develop the required signature for this attack than attacker will be able to execute the malicious software and take a full control of the corperate network. To stop the malicious activities at an early [...]