rss

Latest Articles

Contributor Articles on Information Technology and Security

What to do in the Aftermath of an Attack

What to do in the Aftermath of an Attack

Can you hack cleaning up the mess a hacker makes after infiltrating your computer? Would you even know the first thing to do? And yes, YOU’RE computer CAN be hacked. After the attack, locate the portal through which the crumb-bag entered. This could be the e-mail program or browser. This may be easier said than done. Give it a shot.


Chip and PIN, will It save Us?

Chip and PIN, will It save Us?

Many Americans, says a recent survey by Gallup, worry about a data breach connected to the use of their credit cards. Interestingly, many people use a credit card for everything under the sun: even just a soda and bag of chips from the convenience mart. The more you use a credit card, the more likely it will be compromised by cyber thieves.

What Small Business Needs to Know about Cyber Security Threats

What Small Business Needs to Know about Cyber Security Threats

In a recent 60 Minutes episode, What Happens when you Swipe your Card , CBS News correspondent Bill Whittaker reported that 2014 was the “year of the data breach”, primarily because the number of reported intrusions or data breaches into computer systems of U.S. companies set an all-time record high.
How to Win the War on Phishing

How to Win the War on Phishing

A phishing attack is a trick e-mail sent randomly to perhaps a million recipients, and the thief counts on the numbers game aspect: Out of any given huge number of people, a significant percentage will fall for the trick. The trick is that the e-mail contains certain information or is worded in such a way as to get the recipient to click on the link in the message.

 



Cloud Computing Reports and Case Studies