Quantcast
Channel: Computer Security
Browsing all 10 articles
Browse latest View live

IT risk approach for successful compliance implementation

There are a lot of definitions of IT risk, but, before let you know that every business venture is basically risky. In new business ventures and new product development, there are unknown factors and...

View Article



70% of attacks come from internal company

Rich Brewer of International Data Corp. (IDC) commented during Directions '99 that "the perception is that most hack attacks come from political activities and professional industrial thieves, but the...

View Article

How to prove that IT = very high risk

The importance of IT to the modern enterprise screams out through high investment, the pervasiveness of the technology, our reliance on its continuing operation and the pain we suffer when it doesn’t...

View Article

The four things every IT security must do every day

Security work is a continuous and daily process. You can’t just install a firewall or an intrusion-detection system and say that you’re suddenly secure. In some cases, you’ll be lucky to enter an...

View Article

Image may be NSFW.
Clik here to view.

Download Free ZoneAlarm Firewall for Windows Vista

The advantage of the ZoneAlarm firewall over the built-in Vista firewall is that ZoneAlarm will only allow those programs you specifically ok to access the Internet. Microsoft's Vista firewall does...

View Article


Cryptography versus computer security

Cryptography and computer security are two distinct subjects. Cryptography is the art of encoding information in a secret format such that only the intended recipient can access the information....

View Article

Disaster Recovery Planning, Seven simple step

Step 1 – Admit the possibility of disaster Just as the first step to personal recovery is admitting one has a problem, so the first step in BCDR planning is to admit the organization faces tangible...

View Article

Six loss prevention tips for laptop during travelling

Do you know that recently it was reported by some research that claims over 10,000 laptops are lost or stolen every WEEK at US airports. So here are simple six loss prevention tips for laptop during...

View Article


The top 10 reasons website get hacked

1. Cross site scripting (XSS) The “most prevalent and pernicious” Web application security vulnerability, XSS flaws happen when an application sends user data to a Web browser without first validating...

View Article


How good is your IT Security Administration

So how good is your IT Security Administration? Below some of the list that is intended as a guide to the various areas that need to be reviewed to conduct a complete assessment of security...

View Article
Browsing all 10 articles
Browse latest View live




Latest Images