full screen background image
Search
Wednesday 22 November 2017
  • :
  • :

Category: Protection

DEFENDER: WordPress Plugin Evaluation

Introduction In this article, we will look at the DEFENDER WordPress plugin. This plugin is touted to provide layered security for...

Sonar δωρεάν εργαλείο της Microsoft για ανάλυση ιστοσελίδων

Αναρωτιέστε αν η ιστοσελίδα που έχετε είναι σωστά κωδικοποιημένη; Η ομάδα...

Quick Wins For Improving Performance And Security Of Your Website

Many companies try to create a great experience for customers. But few are willing to make the changes required to deliver on that promise....

How To Keep Yourself Safe From Latest Data Breaches

Recently, many of the HBO’s shows were leaked online. Earlier, the Wanna Cry ransomeware affected the people across the globe....

Using Verified Identity to Prevent Personal Data Breaches

Yet again, I open my laptop, check out the news, and see that there has been another mega-hack. This time the target was Equifax, and the...

Install & Enable HTTPS on Apache Server

Install & Enable HTTPS on Apache Server First of all, you need to have a website that can run under http. This tutorial is about...

Anti-Phishing Services: Pros and Cons

What Is Anti-Phishing?  Anti-phishing includes the number of techniques used to prevent phishing attacks against the individual’s...

Anti-Phishing Laws & Regulations

Information security has never been more important. New threats are rising and old threats still lurk. Data has become the new currency and...

Anti-Phishing Tips

Anti-Phishing Tips Phishing Countermeasures Articles: Technical Countermeasures Non-technical Countermeasures Simulated Phishing Campaigns...

Anti-Phishing: Browser Security Features

For a common internet user, a web browser is one of the regularly used programs on the computer. Web browsers were once only used for...

Anti-Phishing: C-Level Support for Phishing Awareness Training

It is becoming harder and harder to detect phishing attempts. These attempts are becoming more and more sophisticated, meaning even an...

Anti-Phishing: Factors to Consider When Planning, Developing and Implementing Phishing Awareness Training

Phishing as Part of Security Awareness Training Security awareness training is very broad in scope, but essentially it amounts to creating...

Anti-Phishing: Measuring Phishing Awareness Training Effectiveness

Do you train your employees to understand what phishing is, what it looks like and what to do if they realize they’ve been targeted? As...

Anti-Phishing: The Importance of Phishing Awareness Training

Of all the precautions you need to take to keep your company afloat, planning for phishing attacks may be the most important by far....

Anti-Phishing: Threat Modeling and Impact Analysis

Introduction Phishing is an efficient and cost-effective cyberattack. It has prevailed in cyberspace for over two decades. Phishing is...

Anti-Phishing: Use Policies – Best Practices for Internet and Email

An Internet usage policy is no longer something that organizations can consider operating without. It’s of pivotal importance to lay out...

How to secure Ubuntu Server using Google Authenticator

Hello friends, today we are going to implement two-factor authentication on ubuntu. Two-factor authentication adds an extra layer of...

Top 10 Anti-Phishing Best Practices

Emails are one of the major modes of communication today. Companies rely heavily on emails when conducting their day-to-day operations....

Top 5 Strategies to Avoid Getting Hacked Online

While we are becoming increasingly more reliant on technology and storing our information online, this trend increases the quantity and...

Tips for Managing Physical Security

Source: GAO According to the security expert S. Harris, “physical security protects people, data, equipment, systems, facilities and...

Penetration Testing SQL server

Penetration Testing SQL server SQL Server is a relational database management system from Microsoft, which is used as a central location to...

ESET: Συμβουλές για κυβερνοασφάλεια και στις διακοπές

ESET: Αν ανήκετε στην κατηγορία των ταξιδιωτών που δεν μπορούν να πάνε...

Explanation of Rootkits & How To Stay Safe From Rootkits

Explanation of Rootkits & How To Stay Safe From Rootkits In this article I will explain what Rootkits are and how we can stay partially...

Top 20 Security Awareness Tips & Tricks

Keeping your data safe and far away from the clutches of the hacking community is a need of the hour in today’s world. We have compiled...

The Ins and Outs of Email Security Awareness

Email has been used as a medium for remote communication even before the World Wide Web and other technological breakthroughs came into...

Ways to Stay Secure When using File Sharing

When sharing small files over the Internet, you can always attach them to an email but, when the file is large, it may not be possible to...

Best Tips for Creating Strong Passwords

Passwords are an important safeguard for our data, yet so vulnerable: Verizon Enterprise recently reported that 63% of breaches are due to...

Managing Desktop Security

Why Is Desktop Security Important? Desktop security can be thought of as the first line of defense on a company’s network. By having...

Explanation of Rootkits & How To Stay Safe From Rootkits

Explanation of Rootkits & How To Stay Safe From Rootkits In this article I will explain what Rootkits are and how we can stay partially...

APACHE PROTECTION WITH MODSECURITY

There are so many ways to protect Web-server. On this post, I’m going to guide how to use ModSecurity WAF to protect Apache...