Posts Tagged ‘Best Practices’

The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Monthly Report

The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) released their monthly monitor report in collaboration with US-CERT, the report focus to assist the community with ways to secure and protect their environment. If we look at the report it is stated the increase of highly sophisticated malwares that are targeting different operating and industrial [...]

Share

10 Reasons People Still Fax Documents

Article By Coleen Torres It would seem that with the ever-changing, ever-improving advancements in the digital and web technologies that the fax machine would be reverently retired in the business world; and that the familiar dial, whine and screech would be absent from a modern-day office setting. This, however, is surely not the case and [...]

Share

10 steps To Protect MS Based System This Summer

Protecting your systems against all manner of intrusions will provide more safety for your virtual life, by using complex passwords and a regular file check against changes, plus restricting anything and everything will keep these threats away. We are now at the summer season and at this time we travel and move from one location [...]

Share

NSA Presents “Best Practices for Keeping Your Home Network Secure”

‘Best Practices for Keeping Your Home Network Secure’ is a new document published by the National Security Agency, this document comes to help and provide simple users a path for keeping their system secure and protected. Home users are faced by many security troubles, applying all required security measures are complicated due to the fast [...]

Share

Keep Your Unix-Based System Safe This Summer (Part2)

System monitoring is the most important method for detecting all kinds of Trojans, viruses and any malicious activities on the system. Maintaining control over file integrity can be acheived by installing a tripewire which has the ability to detect changes on each system on which it is installed, checks the integrity of normal binaries and [...]

Share

Keep Your Unix-Based System Safe This Summer (Part1)

Protecting your systems against all manner of intrusions will provide more safety for your virtual life, by using complex passwords and a regular file check against changes, plus restricting anything and everything will keep these threats away. Computersremain the easiest point to compromise if there is a physical access. At schools, universities, cafes or the [...]

Share

Golden rules of safe internet shopping

A very interesting article that Andy Dalrymple, managing consultant information risk management at Global Secure Systems (GSS) posted, this article provides a twelve golden rules to safely shopping online. you can find the Tips Here.

Share