IT Security
-
Complying with Privacy and Security Regulations
Complying with Privacy and Security Regulations: An organization’s security management policies don’t exist in a vacuum. Regulatory and governmental agencies…
Read More » -
Typo Squatting and URL Hijacking
Typo Squatting and URL Hijacking: Typo squatting (also spelled typosquatting) and URL hijacking are the one and the same. Difficult…
Read More » -
Government and Military Classification
Government and Military Classification: The U.S government and the military have slightly different types of concerns relating to information classification.…
Read More » -
Surviving Viruses
Surviving Viruses: A virus is a piece of software designed to infect a computer system. Under the best of circumstances,…
Read More » -
Antivirus Software
Antivirus Software: The primary method of preventing the propagation of malicious code involves the use of antivirus software. Antivirus software…
Read More » -
Symptoms of a Virus Infection
Symptoms of a Virus Infection: Many viruses will announce that you are infected as soon as they gain access to…
Read More » -
Hardening Email Servers
Hardening Email Server: Email servers provide the communications backbone for many businesses they typically run either as an additional service…
Read More » -
Securing the Network
Securing the Network: Obviously, network security is broad topic, and it will be addressed throughout these articles However, there are…
Read More » -
The Private – Public – Community and Hybrid Cloud
Private Cloud: According to NIST, a private cloud is defined as follows: The cloud infrastructure is provisioned for exclusive use…
Read More » -
Noteworthy HTTP Status Codes
HTTP Status Codes: As web server responses are received by your browser, they will include a status code to signal…
Read More »