Tuesday, 27 May 2014

The incident of data theft by Edward Snowden is bothering National Security Agency and making them restless. The young man stolen unknown extremely secret documents from the database of NSA and all he was equipped with just a small USB flash drive. This is how useful and lethal that small data storing device is. The National Security Agency has some rules and policies regarding the use jump drives, but, still it got hit by a data theft incident....

Monday, 26 May 2014

Secure USB The best way to make your data portable is by using secure USB drive. That is why it has been most used portable data storing device all over the globe by a big margin.  However, carrying your information in a flash drive that has no security measures can impose huge risks on it. Billions of USB drives must have been sold last year, but, how many of them had built in the security barriers. I wonder how low would be their percentage....

Friday, 23 May 2014

Cyber criminals have now turned their faces towards cell phones as they know that there are very few password protected folders. The majority of the mobile devices such as smart phones or tablets are just waiting to be attacked by hackers. They really do not have any sort security barriers in the way towards their database. The mobile devices have been targeted by millions of malicious apps that can compromise your sensitive information. These...

Thursday, 22 May 2014

The security of iPhone is wholly a different idea from the orthodox security of computers, laptops or laptops. As the threats to iPhone security is quite different from the risks related to laptops or computers, so, the Apple’s smartphone cannot be protected using the same techniques used for the protecting your computing devices. The antivirus software and similar security measures will not help your cause of securing your iPhone faces different...

Monday, 19 May 2014

When was the last time you left home without your smart phone? If you have – at some point in time – chances are, you’ve become distressed and felt as you left behind a vital part of your life – something that’s usually essential for our survival. It’s funny how technology – especially information technology – is changing how we function in everyday life.  Consequently, with information technology reaching new heights by every passing...

Thursday, 15 May 2014

The year of 2013 was the most nightmarish year in the history of computing. The lack of password protected folders allowed a huge number of data breach incidents. The statistics of 2013 regarding information security are really scary. It seemed like data thefts had complete freedom and were allowed to steal any amount of data from any source they wish. A huge number of data breach incidents took place in the previous year that compromised millions...

Friday, 9 May 2014

Recently, the University of Iowa State became a victim of a brutal incident of data breach. The incident resulted in about the leakage of 30,000 records of current students as well as of the former students. Almost 28,000 students got their social security number compromised and about 19,000 of the students got their student identity breached. All the victims have been informed by the university officials of the hazardous incident that the University...

Thursday, 8 May 2014

The issue of information security is almost incurable and the reasons behind it are extremely common. The CEO and the president of Protegrity, Gordon Rapkin has put up some of the most common data security issues and simple solutions for them. Unaware of your data’s movement and usage You should be aware of where your data is travelling and who is using it. Without such knowledge, you will not be able to maintain proper security of your records and it will have fair chances of being compromised. Track down your data and make a series of...
  • RSS
  • Delicious
  • Digg
  • Facebook
  • Twitter
  • Linkedin
  • Youtube