Data encryption has proven to be an effective source of protecting sensitive data from being stolen or manipulated by unauthorized entities. According to latest report released by WinMagic Data Security (n.d.), there are certain myths and misconceptions that are found in peoples’ minds. (McNickle, 2012) Let’s debunk them! [Read more…]
A comprehensive definition of Information Security is: ‘Information security is a set of strategies for managing the processes, tools and policies necessary to prevent, detect, document and counter threats to digital and non-digital information’. (Rouse, 2016)
One needs to establish a set of business processes that ensures the safety of the information assets. It does not matter how information is being formatted, whether it is in transition phase or is stored at a single place. The responsibility includes every kind of information that is related to you or your company and its relations. Information Security or Infosec programs are based on CIA triad objectives: maintaining the confidentiality, integrity and availability of IT systems and business data. (Rouse, 2016) [Read more…]
GDPR or General Data Protection Regulation is the primary law regulating the companies on how to protect the personal data of European citizens. The European Parliament and Council passed it back in April 2016 and it will be replacing Data Protection Directive 95/46/ec in spring 2018. It is mandatory for the companies that are already in compliance with the Directive to comply with the new privacy law by May 2018 to avoid stiff penalties and fines in case they fail to do so. (Lord, 2018) [Read more…]
It took a while, but OneDrive Sync can now sync files that contain # and %. Microsoft has decided not to roll this out to all tenants yet, but administrators can now enable this for their Sharepoint sites and OneDrive for Business users. [Read more…]
Technology has changed the way we perceive things and work. It has made things possible which were inconceivable a century ago. Tedious tasks that seemed tiresome and no one wanted to be the one doing it, are now piece of cake. Huge amount of data now can be processed, stored and analyzed through the use of latest innovations. But like any new invention and innovation, the facilities do come with their own sets of problems. (Dickson, 2016) [Read more…]
DDoS – Distributed Denial of Services are kinds of DOS attacks that are carried out by multiple compromised systems, infected with Trojan virus mostly, on a single system. DDoS attacks are double-edged knives as they are also adversely affecting the systems hackers are using to attack the victim system. (Beal) In DDoS, the traffic of malicious attack comes from various sources, sometimes from hundreds and thousands of origins. It is, therefore, impossible to handle such attack by just blocking a single IP address. (Beal) This makes it all the more dangerous and damaging to your online presence as an individual and as a company. [Read more…]
“Antivirus” programs are designed to prevent viruses, malware and corrupt files from harming our computer system and data. That is the common perception attached with the concept of installing antivirus programs in our computers and laptops. Nowadays the term antivirus isn’t used as often as before, we call it “Security software” or “Internet Security”. [Read more…]
Internet of Things are an integral part of our lives without which, it is unimaginable to exist in this era of technological progression. Everything we use these days is some way or another, connected to Internet. So it comes as no surprise that changes in the net neutrality has direct impact on Internet of Things. Here in this article, we are going to discuss the influence end of net neutrality will have on Internet of Things, if and when it happens. [Read more…]
Welcome to my blog. My name is Thom Heemstra. My blogs will be of a technical nature, some may have a more philosophical or ethical ground.
I’m very interested in Internet of Things (IoT), Blockchain technology, Big Data (Analysis/Processing).
Very early in life I started my own company, which was later named XSbyte, an internet service company (B2B).
Cryptocurrency – it came, it saw, it conquered; and now it is facing a foreign invasion. Its defences were breached by hackers who managed to get away with 153,000 ethers, which are $32 million in current exchange rate. Parity Technologies faced this security hack in their multi-signature wallet software while normal wallets are safe as yet. Before this, CoinDash had to cancel their ICO after facing a $10 million hack. (Wilmoth, 2017) [Read more…]