Thom Heemstra's blog

You are here: Home / Archives for Security

How To Respond To A Security Issue

20th July 2018 by thom Leave a Comment

Incidents like data leakage and security breach seem to occur quite frequently in this age of digitalism. According to a recent study conducted by British government, well-establish banks and large organizations are not the only frequent targets of security breaches. (Magee, 2018) Almost all businesses, from small to large are prone to security threats. Fortunately, there are many effective ways to respond to all such security issues. Let’s have a look at top most recommended solutions for this digital problem: [Read more…]

Filed Under: Internet of Things, Security Tagged With: management, protocol, security

The Importance of Multi-Factor Authentication (MFA)

15th June 2018 by thom Leave a Comment

With relentless increase in digital crime and online frauds, proper safeguarding measurements have become more important than ever.  Studies have shown (Solange, 2014) that big companies and celebrities have been a victim of hacking in the recent past, so what can stop the digital criminals to not target you?

Multi-factor Authentication Method Can Help!

One verified way to ensure your account and data safety is the multi-factor authentication method. Usually, passwords are used to protect the confidential data but relying on them solely is not a wise option. Multi-factor authentication (at least 2FA) method also known as multiple-factor verification is basically a mechanized double check process to verify the identity of the logger. With this method, accounts remain safe and well-protected even if the passwords have been figured out. [Read more…]

Filed Under: Privacy, Responding to news, Security Tagged With: 2fa, authentication, mfa, multifactor authentication

Practical Tips for Password Security

1st June 2018 by thom Leave a Comment

In this digital age, passwords are just like valued currency and should be set with great care to prevent an unauthorized access to confidential data. This new world is digitally connected and allows an easy transfer of data from one network to another. Where this advancement has made our lives quicker and easier, it has also increased the risk of data leakage.

To protect the sensitive information contained by online accounts, passwords are set. But the problem is that hackers are efficient enough to crack the passwords and obtain desired information. To prevent this activity, the only solution is to strengthen the password security so nobody will be able to break the lock. [Read more…]

Filed Under: Privacy, Responding to news, Security, Tutorials Tagged With: advice, news, passwords, security

Common Misconceptions about Encryption

16th March 2018 by thom Leave a Comment

Data encryption has proven to be an effective source of protecting sensitive data from being stolen or manipulated by unauthorized entities. According to latest report released by WinMagic Data Security (n.d.), there are certain myths and misconceptions that are found in peoples’ minds. (McNickle, 2012) Let’s debunk them! [Read more…]

Filed Under: Privacy, Security Tagged With: Encryption

Information Security: 6 things to keep in mind when writing data protection policies

2nd March 2018 by thom Leave a Comment

A comprehensive definition of Information Security is: ‘Information security is a set of strategies for managing the processes, tools and policies necessary to prevent, detect, document and counter threats to digital and non-digital information’. (Rouse, 2016)

One needs to establish a set of business processes that ensures the safety of the information assets. It does not matter how information is being formatted, whether it is in transition phase or is stored at a single place. The responsibility includes every kind of information that is related to you or your company and its relations. Information Security or Infosec programs are based on CIA triad objectives: maintaining the confidentiality, integrity and availability of IT systems and business data. (Rouse, 2016) [Read more…]

Filed Under: Big Data, Security Tagged With: ibs, information management

GDPR and Practical Things to Look Out For

16th February 2018 by thom Leave a Comment

GDPR or General Data Protection Regulation is the primary law regulating the companies on how to protect the personal data of European citizens. The European Parliament and Council passed it back in April 2016 and it will be replacing Data Protection Directive 95/46/ec in spring 2018. It is mandatory for the companies that are already in compliance with the Directive to comply with the new privacy law by May 2018 to avoid stiff penalties and fines in case they fail to do so. (Lord, 2018) [Read more…]

Filed Under: Internet of Things, Privacy, Responding to news, Security

DDoS Attacks: What Are Future Trends?

25th August 2017 by thom Leave a Comment

DDoS – Distributed Denial of Services are kinds of DOS attacks that are carried out by multiple compromised systems, infected with Trojan virus mostly, on a single system. DDoS attacks are double-edged knives as they are also adversely affecting the systems hackers are using to attack the victim system. (Beal) In DDoS, the traffic of malicious attack comes from various sources, sometimes from hundreds and thousands of origins. It is, therefore, impossible to handle such attack by just blocking a single IP address. (Beal) This makes it all the more dangerous and damaging to your online presence as an individual and as a company. [Read more…]

Filed Under: Internet of Things, Security Tagged With: cloud, ddos, doom scenario, hack, internet of things, Knowledge Base

What’s Wrong With the Antivirus Products?

18th August 2017 by thom Leave a Comment

“Antivirus” programs are designed to prevent viruses, malware and corrupt files from harming our computer system and data. That is the common perception attached with the concept of installing antivirus programs in our computers and laptops. Nowadays the term antivirus isn’t used as often as before, we call it “Security software” or “Internet Security”. [Read more…]

Filed Under: Internet of Things, Security Tagged With: antivirus, doom scenario, Knowledge Base, malware, security

Impact of End of Net Neutrality on Internet of Things

11th August 2017 by thom Leave a Comment

Internet of Things are an integral part of our lives without which, it is unimaginable to exist in this era of technological progression. Everything we use these days is some way or another, connected to Internet. So it comes as no surprise that changes in the net neutrality has direct impact on Internet of Things. Here in this article, we are going to discuss the influence end of net neutrality will have on Internet of Things, if and when it happens. [Read more…]

Filed Under: Internet of Things, Privacy, Responding to news, Security Tagged With: cloud, doom scenario, Encryption, internet of things, iot, Net Neutrality, Privacy

Sensing the Future of the Internet of Things: Sensors and IoTs

28th July 2017 by thom Leave a Comment

Sensors are making a comeback. Micro-electromechanical Systems (MEMS) becoming inexpensive may be one of the reasons that made it possible for sensor technology to become part of our lives again. They have unlimited uses and have a bright future ahead. Sensors are present in a wide variety of gadgets in use these days, like smart phones, Tablets etc. [Read more…]

Filed Under: Internet of Things, New Media, Security Tagged With: iot, sensors

  • « Previous Page
  • 1
  • 2
  • 3
  • 4
  • Next Page »
Follow @th33mstra

Thom Heemstra
@th33mstra

  • RT @nicktolhurst: “We only went to Washington to visit its world famous Cathedral. We had no idea what was happening elsewhere there.” http…
    about 1 week ago
    Reply Retweet Favorite
  • RT @nicktolhurst: Your reminder once again... Boris Johnson’s majority is larger than the hard right ERG group. And Labour are extremely…
    about 1 month ago
    Reply Retweet Favorite
  • @DavidJEWood @ritakhoury10 This is the same view as in the pic https://t.co/822ccVQ24P
    about 2 months ago
    Reply Retweet Favorite

Recent Posts

  • Recent Developments in Blockchain
  • Top 5 SEO Mistakes Made By Marketing Agencies
  • Why Is Link Building Important For SEO?
  • Internet Privacy Issues And Ways It Can Be Compromised
  • 10 Practical Tips to Improve Online Privacy

Categories

  • Announcements
  • Artificial Intelligence
  • Big Data
  • BlockChain
  • Internet of Things
  • Money
  • New Media
  • Privacy
  • Responding to news
  • Security
  • SEO
  • Tutorials
  • Webhosting

Copyright © 2021 · Agency Pro Theme on Genesis Framework · WordPress · Log in