Thom Heemstra's blog

WHAT IS CRYPTOJACKING AND HOW TO PREVENT IT?

7th December 2018 by thom Leave a Comment

Cybercrime is at an all-time high. Although, the entire tech industry is doubling down on security; efforts have still been ineffective to stop the evil.

One of the many reasons for that is because black hats are becoming more ingenious with their exploitative methods.  Crypto jacking is one such example of their cunning minds. We can describe it as the unauthorised use of someone’s hardware to mine cryptocurrency. In simpler terms, it means that a program hijacks your computer, tablet or mobile phone and use the device to mine Cryptocurrencies. [Read more…]

Filed Under: Money, Responding to news, Security Tagged With: antivirus, cryptocurrency, cryptojacking

What to Take Into Account When Choosing Hosting For Your High Traffic Word-Press Website

2nd November 2018 by thom Leave a Comment

The 21st century is an era of technology… technology that also allows people to communicate. Writers, companies and NGO’s from all over the world have now found new ways to interact with their audiences and share their stories and views. One such trending way is wordpress that allows writers from all over the world to convey their message in the form of a blog or website. Now when people have their own websites they want it secure, speedy, efficient and updated, and this all requires a host (Dirkin, 2018). The free hosted WordPress websites allow for basic customization, if you want more, you’ll have to find a host, that will accomodate your needs. How to find such a host? Take these things into consideration. [Read more…]

Filed Under: Webhosting

The Role Of Artificial Intelligence In Network Operations

5th October 2018 by thom Leave a Comment

Artificial intelligence has brought about a revolution in the Information Technology industry.

Websites are an excellent way to market your presence in the world. Countless businesses from all industries are opting for websites to market. It is no wonder since the growth of the internet; websites are one of the safest options to reach your desired audience.

One of the essential aspects that bring a website to life (also keeps it alive) is the service that hosts your site. In simple terms, web hosting is the service that provides the infrastructure necessary to bring your website to life. A web host is a provider of that. (NORONHA, 2017)

Artificial intelligence (AI) is alleviating many industries to work more efficiently, and web hosting is poised to benefit the most due to it. (McAllister, 2017)

Then the question arises “how can AI help in web hosting services?” Let us look at some of the ways AI helps to solve various web hosting issues. [Read more…]

Filed Under: Artificial Intelligence, Internet of Things Tagged With: AI, security

Safely Using Collaboration Tools

27th July 2018 by thom Leave a Comment

In this digital era, working within larger groups has become easier, efficient and more productive, especially if you compare it to groupware software of the previous decennium. It is very common for employees to use collaboration tools to encourage and support the communication between employees and specific (internal and external) team members. These tools have allowed people to work together online to achieve a goal but at the same time, to get the work done, employees do create an unintentional risk to data security. [Read more…]

Filed Under: New Media, Privacy, Security Tagged With: collaboration, management, project management, security, team

How To Respond To A Security Issue

20th July 2018 by thom Leave a Comment

Incidents like data leakage and security breach seem to occur quite frequently in this age of digitalism. According to a recent study conducted by British government, well-establish banks and large organizations are not the only frequent targets of security breaches. (Magee, 2018) Almost all businesses, from small to large are prone to security threats. Fortunately, there are many effective ways to respond to all such security issues. Let’s have a look at top most recommended solutions for this digital problem: [Read more…]

Filed Under: Internet of Things, Security Tagged With: management, protocol, security

The Importance of Multi-Factor Authentication (MFA)

15th June 2018 by thom Leave a Comment

With relentless increase in digital crime and online frauds, proper safeguarding measurements have become more important than ever.  Studies have shown (Solange, 2014) that big companies and celebrities have been a victim of hacking in the recent past, so what can stop the digital criminals to not target you?

Multi-factor Authentication Method Can Help!

One verified way to ensure your account and data safety is the multi-factor authentication method. Usually, passwords are used to protect the confidential data but relying on them solely is not a wise option. Multi-factor authentication (at least 2FA) method also known as multiple-factor verification is basically a mechanized double check process to verify the identity of the logger. With this method, accounts remain safe and well-protected even if the passwords have been figured out. [Read more…]

Filed Under: Privacy, Responding to news, Security Tagged With: 2fa, authentication, mfa, multifactor authentication

Practical Tips for Password Security

1st June 2018 by thom Leave a Comment

In this digital age, passwords are just like valued currency and should be set with great care to prevent an unauthorized access to confidential data. This new world is digitally connected and allows an easy transfer of data from one network to another. Where this advancement has made our lives quicker and easier, it has also increased the risk of data leakage.

To protect the sensitive information contained by online accounts, passwords are set. But the problem is that hackers are efficient enough to crack the passwords and obtain desired information. To prevent this activity, the only solution is to strengthen the password security so nobody will be able to break the lock. [Read more…]

Filed Under: Privacy, Responding to news, Security, Tutorials Tagged With: advice, news, passwords, security

Common Misconceptions about Encryption

16th March 2018 by thom Leave a Comment

Data encryption has proven to be an effective source of protecting sensitive data from being stolen or manipulated by unauthorized entities. According to latest report released by WinMagic Data Security (n.d.), there are certain myths and misconceptions that are found in peoples’ minds. (McNickle, 2012) Let’s debunk them! [Read more…]

Filed Under: Privacy, Security Tagged With: Encryption

Information Security: 6 things to keep in mind when writing data protection policies

2nd March 2018 by thom Leave a Comment

A comprehensive definition of Information Security is: ‘Information security is a set of strategies for managing the processes, tools and policies necessary to prevent, detect, document and counter threats to digital and non-digital information’. (Rouse, 2016)

One needs to establish a set of business processes that ensures the safety of the information assets. It does not matter how information is being formatted, whether it is in transition phase or is stored at a single place. The responsibility includes every kind of information that is related to you or your company and its relations. Information Security or Infosec programs are based on CIA triad objectives: maintaining the confidentiality, integrity and availability of IT systems and business data. (Rouse, 2016) [Read more…]

Filed Under: Big Data, Security Tagged With: ibs, information management

GDPR and Practical Things to Look Out For

16th February 2018 by thom Leave a Comment

GDPR or General Data Protection Regulation is the primary law regulating the companies on how to protect the personal data of European citizens. The European Parliament and Council passed it back in April 2016 and it will be replacing Data Protection Directive 95/46/ec in spring 2018. It is mandatory for the companies that are already in compliance with the Directive to comply with the new privacy law by May 2018 to avoid stiff penalties and fines in case they fail to do so. (Lord, 2018) [Read more…]

Filed Under: Internet of Things, Privacy, Responding to news, Security

  • « Previous Page
  • 1
  • 2
  • 3
  • 4
  • …
  • 6
  • Next Page »
Follow @th33mstra

Thom Heemstra
@th33mstra

  • RT @nicktolhurst: “We only went to Washington to visit its world famous Cathedral. We had no idea what was happening elsewhere there.” http…
    about 2 months ago
    Reply Retweet Favorite
  • RT @nicktolhurst: Your reminder once again... Boris Johnson’s majority is larger than the hard right ERG group. And Labour are extremely…
    about 3 months ago
    Reply Retweet Favorite
  • @DavidJEWood @ritakhoury10 This is the same view as in the pic https://t.co/822ccVQ24P
    about 3 months ago
    Reply Retweet Favorite

Recent Posts

  • Recent Developments in Blockchain
  • Top 5 SEO Mistakes Made By Marketing Agencies
  • Why Is Link Building Important For SEO?
  • Internet Privacy Issues And Ways It Can Be Compromised
  • 10 Practical Tips to Improve Online Privacy

Categories

  • Announcements
  • Artificial Intelligence
  • Big Data
  • BlockChain
  • Internet of Things
  • Money
  • New Media
  • Privacy
  • Responding to news
  • Security
  • SEO
  • Tutorials
  • Webhosting

Copyright © 2021 · Agency Pro Theme on Genesis Framework · WordPress · Log in