Quantcast
Channel: Security – Flarrio
Browsing all 41 articles
Browse latest View live

Network Security – A Process Perspective

Network Security Network security is a big concern these days. Although one could classify the work behind network security as being an essential but non-value added effort, nevertheless it is...

View Article


Why Cybersecurity Should Be Your No 1 Priority #tech2016

More SCADA system exploits are likely to be reported. DDoS attacks and ransomware will continue to trouble organisations. Privacy issues will gain prominence, nationally and internationally, keeping...

View Article


Pay Attention To Your IoT Device Security

Wow cool! A device that lets you know, via Internet, when your milk is beginning to sour! And a connected thermostat – turning the heat up remotely an hour before you get home to save money…and...

View Article

When Mobile Meets Cloud: Why CASBs Matter

The perception in the industry seems to suggest that most businesses are overwhelmingly using the cloud these days. Surprisingly, the truth is that only 37% actually are. However, within the next four...

View Article

11 Ways to Mitigate Insider Security Threats

In today’s world, companies are constantly attacked by hackers, but what if those attacks come from the inside? More companies than ever before are dealing with insider security threats. Here are 11...

View Article


BYOD – Creating A Balance Between Flexibility And Safety

Personal mobile devices and external data access promotes flexibility and improves employee productivity. However, it opens up the possibility of security breaches. Simple things like forgetting to...

View Article

Key Trends Disrupting Messaging / Comms #tech2016

Messaging bots will become primary threat to traditional search. Users will be able to access information via conversation like exchange. SERPs will no longer exist, only top information will be used....

View Article

Scareware Scam Almost Snags Victim

Cybercriminals know that the best way to get their claws on the next victim is to appeal to their emotions, not logic. There are a lot of scary things in life, and one is learning that your computer...

View Article


Why Are Cyber Hucksters So Successful?

Often, hucksters prey on the consumer’s desperation, which is why it is no surprise that the No. 1 rip-off (at least between 2011 and 2012) was the popular market of bogus products promising weight...

View Article


Discover How Enterprise Mobile Technology Is Changing #tech2016

Enterprise mobile security is going to move from the top device and application layer to the bottom layer – data. Every data bit will be controllable by the enterprise. Ninh Tran, Hiretual Mobile...

View Article

Access denied, and what’s behind?

When surfing the web, all of us, every now and then, stumble upon the pages that fail to load. The browser tab may return some obscure references. This article reviews the most common instances. Our...

View Article

Ransomware in the Wild: Statistical Overview

Ransomware is a continuously growing threat to individual computer users and organizations worldwide. It typically leverages an uncrackable combo of RSA and AES cryptosystems to deny the availability...

View Article

Closing the Security Loopholes in Your IT Infrastructure

Breach. The word calls to mind all sorts of things, from Shakespeare to spy movies. Almost all involve attackers breaking in from outside. Tom Cruise suspended inches above the floor in Mission:...

View Article


Cloud Security: 23 predictions you need to know

Cloud companies are struggling to balance security against availability and privacy. New innovative security methods are being developed to create this balance, but the future of Cloud Security is in...

View Article

Moving to a Hosted PBX or On Site IP PBX?

Evolving technology in networking is allowing for significantly higher data throughput which translates to higher internet speeds available to consumers & organizations. For consumers it means...

View Article


Phishing Attacks Two-Factor Authentication

Hackers bank heavily on tricking people into doing things that they shouldn’t: social engineering. A favorite social engineering ploy is the phishing e-mail. How a hacker circumvents two-factor...

View Article

KeRanger Mac Ransomware Virus

KeRanger is the first working Mac ransomware virus, and it’s not theoretical, it’s real and in the wild. The attacked Transmission app was spread from the official Transmission webpage earlier this...

View Article


3 Steps For Secure Cloud Deployment

Attacks on cloud-based services rose from 19 percent two years ago to 33 percent in 2015, according to Arbor Worldwide Infrastructure Security Report XI, 2016. As the number of enterprises moving data...

View Article

Secure And Interconnected Smart Home

Smart Home Technologies will need to think about baking security into their systems, as hackers are increasingly seeing connected devices as a ‘weak link’ and easy way into a person’s network and...

View Article

What Your Competitors Know About Data-centric Security

Data-centric security, at its heart, is just another lock. But what happens when that lock is picked (keys stolen, credentials compromised)? Over the coming quarters, effective monitoring and access...

View Article
Browsing all 41 articles
Browse latest View live