IT Security Concepts
Thursday, 09 July 2015 21:38
This document is an attempt to formulate basic reasoning behind security technologies, we should employ. It is not trying to analyse the actual techniques used and tries to stay away from technology comparisons. I apologize for some of the analogies that may sound infantile. The reason for this is two-fold: it may help to explain the concept to a non-technical reader, but also, I found that using simple analogies may sometimes expose holes in our thinking.
Why use security systems
It is quite obvious that any security system has a cost, not only in terms of cash, but also – more significantly –
Read more ...
Is he trying to put us out of business?
Monday, 06 July 2015 15:23
David Cameron is going to try and ban encryption in Britain
Read BusinessInsider article
It may be uncomfortable to suddenly be on the same side as terrorists, but we seem to be in a good company.
And writing for the Guardian, James Ball suggested
that a blanket ban on encryption would “spell the end of e-commerce” in the UK since credit card details are generally always sent via secure encrypted connections. “Cameron either knows his anti-terror talk is unworkable and is looking for headlines,” Ball said, “or he hasn’t got a clue.”
Well… – guess which one…
Where to keep your sensitive data for remote working
Monday, 22 June 2015 23:28
The table below summarizes security and speed implication of different ways of accessing sensitive data while working out of office.
that the comparison only lists most popular ways of storing data and the Security/Speed correspond to typical situation – in the real world access speed and security provided by local encryption vary.
Read more ...
Snooper’s charter – here we go again!
Thursday, 28 May 2015 15:08
This hydra has plenty of heads. And for each that is cut off, two more grow…
reports on the next attempt of making this bill stick. There is very little a business can do about the external mail – encryption works for recipients who support it and is a good idea. But businesses should start thinking more carefully about their internal emails – obviously more sensitive. It may be a good time to ensure that the internal emails – including from mobile workers and mobile devices – don’t wonder around Internet where they have to be logged, preserved and disclosed to who knows whom – deliberately or by mistake.
Don’t worry we have nothing to hide, or do we?
Tuesday, 03 February 2015 00:31
When the government gathers or analyzes personal information, many people say they’re not worried.
“I’ve got nothing to hide,” they declare. “Only if you’re doing something wrong should you worry, and then you don’t deserve to keep it private.”
Read more ...
Page 1 of 4
Pig Food and 10 Steps to Cyber Security
THINGS are coming!!
Pharmacy 2U (and others)
Trust your supermarket