IT Security Concepts
Thursday, 09 July 2015 21:38
This document is an attempt to formulate basic reasoning behind security technologies, we should employ. It is not trying to analyse the actual techniques used and tries to stay away from technology comparisons. I apologize for some of the analogies that may sound infantile. The reason for this is two-fold: it may help to explain the concept to a non-technical reader, but also, I found that using simple analogies may sometimes expose holes in our thinking.
Why use security systems
It is quite obvious that any security system has a cost, not only in terms of cash, but also – more significantly –
Read more ...
Where to keep your sensitive data for remote working
Monday, 22 June 2015 23:28
The table below summarizes security and speed implication of different ways of accessing sensitive data while working out of office.
that the comparison only lists most popular ways of storing data and the Security/Speed correspond to typical situation – in the real world access speed and security provided by local encryption vary.
Read more ...
FBI to #WordPress users: patch now before ISIL defaces you
Wednesday, 08 April 2015 16:33
If you are running Joomla sites oatch up as well > FBI to WordPress users: patch now before ISIL defaces you on The Register —
Hotel #Wi-Fi not only hideously expensive! It’s horribly #insecure @richardzybert
Monday, 30 March 2015 13:29
The expensive hotel Wi-Fi is shocking. I use @richardzybert software and hardware so I know I will be secure > Wi-Fi not only hideously expensive it’s horribly insecure —
#BT Home Hub #SIP backdoor blunder blamed for #VoIP fraud
Wednesday, 25 March 2015 18:48
BT Home Hub SIP backdoor blunder blamed for VoIP fraud —
Page 1 of 2
Pig Food and 10 Steps to Cyber Security
THINGS are coming!!
Pharmacy 2U (and others)
Trust your supermarket