IT risk approach for successful compliance implementation
There are a lot of definitions of IT risk, but, before let you know that every business venture is basically risky. In new business ventures and new product development, there are unknown factors and...
View Article70% of attacks come from internal company
Rich Brewer of International Data Corp. (IDC) commented during Directions '99 that "the perception is that most hack attacks come from political activities and professional industrial thieves, but the...
View ArticleHow to prove that IT = very high risk
The importance of IT to the modern enterprise screams out through high investment, the pervasiveness of the technology, our reliance on its continuing operation and the pain we suffer when it doesn’t...
View ArticleThe four things every IT security must do every day
Security work is a continuous and daily process. You can’t just install a firewall or an intrusion-detection system and say that you’re suddenly secure. In some cases, you’ll be lucky to enter an...
View ArticleDownload Free ZoneAlarm Firewall for Windows Vista
The advantage of the ZoneAlarm firewall over the built-in Vista firewall is that ZoneAlarm will only allow those programs you specifically ok to access the Internet. Microsoft's Vista firewall does...
View ArticleCryptography versus computer security
Cryptography and computer security are two distinct subjects. Cryptography is the art of encoding information in a secret format such that only the intended recipient can access the information....
View ArticleDisaster Recovery Planning, Seven simple step
Step 1 – Admit the possibility of disaster Just as the first step to personal recovery is admitting one has a problem, so the first step in BCDR planning is to admit the organization faces tangible...
View ArticleSix loss prevention tips for laptop during travelling
Do you know that recently it was reported by some research that claims over 10,000 laptops are lost or stolen every WEEK at US airports. So here are simple six loss prevention tips for laptop during...
View ArticleThe top 10 reasons website get hacked
1. Cross site scripting (XSS) The “most prevalent and pernicious” Web application security vulnerability, XSS flaws happen when an application sends user data to a Web browser without first validating...
View ArticleHow good is your IT Security Administration
So how good is your IT Security Administration? Below some of the list that is intended as a guide to the various areas that need to be reviewed to conduct a complete assessment of security...
View Article