How Secure Is Your Password

How Secure Is Your Password?

Maintaining password hygienes is the most fundamental aspect of securing your online life and is a striking problem of the internet age. Every year hundreds and thousands of user accounts are hacked by betrayal due to weak or reused passwords that are the bane of online life. The only way to limit password phishing and…

Top 5 Reasons You Can Be Phished

Top 5 Reasons You Can Be Phished

Phishing Attack has taken on a new meaning with 90% of data breaches that an organization succumbs to has got to do with phishing. What makes Phishing attacks so successful. Here are five pointers that are worthy of blame: Users are the weakest link: Most users are the weakest link as they open spurious emails…

Next generation Cyber Threats

Next-generation Cyber Threats

The last decade was witness to a marked digital transformation that included cloud infrastructure, applications and services, Internet of Things technology ( IoT), virtualization of data centers, social media and the rapid penetration of mobiles with Bring Your Own Device (BYOD) Concept. All this led to a watershed of digital content that was diluted by…

Iot Security

IoT & Security

IoT and Security are interrelated and best comprehended by first understanding their individual roles cut out for them. IoT (Internet of Things) is a concept called machine to machine (M-M) connectivity realized by embedded sensors that engage the machines to communicate with one another, likewise not being restricted to machines alone. IoT also encompasses machines,…

The Consequences Of A Data Breach

The Consequences Of A Data Breach

An information rupture, or information spill, is a security criterion in which protected information is hacked into or stolen by unapproved watchers. An information rupture is not quite the same as data loss which is when information can never again be retrieved on account of hardware failure, deletion or any other reason. On the other…