IT Security Blog

  • Home
  • About IT Security Blog
  • IT Security Basics
  • Real-World Issues
  • Network Security
  • News
  • Malware
  • Tips
  • Spyware

Complacency – the IY industry’s Worst Enemy

20 July 2011 By Saran

complacency.jpgThis has been proven true by incidents broadcast around the world in minutes or hours after they have happened. Many have suffered the consequences of such incidents in the UK, US and mostly each and every place on earth where people have had their information taken and used for no good before there was even a sign that there was a problem.

Big business has been reminded again and again that complacency is it’s worst enemy and they have failed again and again at the area. Why? Well first, total protection is almost always imperfect and somebody out there with enough intent and resources can break-in however expensive the protection methods may be. Next is that the best systems for protection is always the ones that cost too much yet they still remain vulnerable and hackable. Contrary to most ad’s you see in print, the internet or your Television there is no one true solution to protection, for if the hardware and software measures succeed in protecting you, the human behind the computer/s are always the biggest risk. That is why even the most expensive solutions are used in conjunction with other solutions to provide the best of both worlds combining physical and software solutions hoping that combination will be enough protection from the continuous influx of attacks from the web and elsewhere. Encryption is nice but it takes a lot of computing power to implement making it too expensive for implementation on all levels of the company. All of these high-tech solutions and hardware would be nothing if the people using the various computer systems in the said organization fail to use them so the weakest link in every system is still the human. Strict adherence and compliance is the key with systems that process information somewhat autonomously already in use doing the searching and classification of information without the user’s input. This uses the latest in Artificial Intelligence with minimal intervention or input from the users.

Filed Under: Cryptography, General, IT Security Basics, Network Security, Physical Security, Privacy & Anonymity, Real-World Issues, Security Policies Tagged With: IT Security Basics

Biometrics + Physical security = Next best thing to unbreakable?

13 July 2011 By Saran

bio.jpg
Biometrics is seen as the next step in computer systems security and access control due to the failure of more primitive and fundamental security systems. Fingerprint scanners, passwords, security keys and even smartcards have failed miserably in providing the ultimate and most secure intrusion prevention method for just about anything. From your home, car, computer terminal at work to just about anything else that needs security, it has be come more and more of a must due to the increasing threat of identity theft and other computer related crimes in and out of the workplace.

Biometrics are security systems that are based on the differences the human body manifests in terms of eye structure, facial features and now vein geometry. We’ve all heard of DNA or the so-called blueprint for life and the way it makes each and every human different from everyone else on this earth (well, except for some genetic disorders and diseases that changes the DNA makeup). That is what biometrics takes advantage of as a source of a very unique key or method of identifying one from another person.

Your fingerprint is mapped when it is initially scanned into a computer system which convert’s your analog (actual) print into a digital map that is as unique as you are an individual. Iris scanners take into account the differences the iris has from each and every individual (through the use of a low powered light and scanner to obtain a picture of the eye’s iris which is also unique). Voice recognition takes into account, the differences our voices have from everybody else also converting it into a digital map or password of sorts. Vein geometry, uses a thermal imaging camera to take a picture of your hand or whole body which is sensitive to heat showing all the blood vessels which show as hotspots thus giving you a unique id of sorts as that is also mapped and converted into digital form. All of the above biometrics systems rely on our individual differences which are quite unique to us and add onto it, other more basic security measures such as a physical key (password, key or other devices) to give the ultimate security system preventing intrusion.

Filed Under: General, IT Security Basics, Network Security, Operating Systems, Physical Security, Real-World Issues, Security Policies Tagged With: identity-theft, Secure workplace

Cheaper Isn’t Always Better

16 May 2011 By Saran

cheaphostBlogs are the in-thing today and everybody on the planet wants to have one. WordPress being one of the most trusted and used platforms has suffered a great deal from the relentless attacks conducted by hackers who use it for spreading malware to the millions of users on the platform. Another weak link in the blogging trends are the millions of hosting companies, who all want to host as many people on earth they can so they earn as much profit as possible. These hosting servers and service providers might smell good on the outside but can be quite rotten on the outside so getting the right information on the hosting service you aim to use is vital for the survival of your blogging efforts. Web hosting review sites have sprung all over the place and are proving to be the best source of information for budding bloggers and SEO marketers. They offer unbiased information regarding the several or so hosting services giving you the tools to determine the best web hosting information around. These analytical tools may spell success or failure for your blog and thus SEO efforts, so don’t go out without them.

Filed Under: General, IT Security Basics, Malware, Real-World Issues, Tips Tagged With: Cost Analysis, Hosting Information, Web Hosting, Web Hosting Reviews

Installing CCTV Cameras

13 April 2011 By Saran

Closed Circuit TV Cameras (CCTV) have indeed become a new face of overall protection and security. At the rate that security is breached and terrorism growing rampant these days, it is apparent that any place or business establishment needs to work up its security measures to ensure maximum protection for the innocent consumers and people who are unaware of threats that may come their way.

But one issue that has been heard all throughout the world is on their reliability. You can monitor various activities but then what? What action would you take? If you do, would it be enough to avoid any accidents that may suddenly occur.

Apparently, many establishments just want to avoid the trouble. Mischief lingers anywhere these days and the best thing that you can do is to try and avoid them. Compared to the early days, tighter security through videos allows the place owners to monitor abnormal and suspicious behaviors to which the proper steps to avoid them can be done.

The list goes as far as advanced security measures such as the high security of sealed places where new technology as thumbprints, eye scanners and card swiping for better monitoring of accessing people limits the list of potential breaches in a certain area.

This has helped a lot and in times where something unfortunate may happen, investigators can have a better time catching culprits thanks to these hidden monitors. These days, that is why most mischievous people have made it a point to survey before attacking. Sadly, some of them have found a way to get around CCTV security as well.

Filed Under: IT Security Basics, Physical Security, Real-World Issues Tagged With: access, cctv, monitoring, security

More E-mail Security Tips

31 March 2011 By Saran

Young Woman on Bed Using a Laptop

I was only able to fit in two tips in the previous post but no worries, here are more things for you to look at.

To subscribe or unsubscribe? What to do?
You know those e-mail messages informing you of one thing or another and then at the bottom it says “To unsubscribe to this service, click on this link…” or something like that? Well, many are legit but here’s the thing – this tactic is also being used to get you to click on the link and gather information from you. What you should do, instead of immediately unsubscribing, is to first double check if you really have subscribed to that service. Otherwise, you just might find more spam mails in your Inbox. If you’re unsure, just mark the address as spam so that it can be filtered in the future.

Guard “important” e-mail addresses
Some people guard their phone numbers zealously. They would only give their numbers to people they know very well and people who they are ok with contacting them. How come, when it comes to e-mail, it seems that people are less guarded? It shouldn’t be the case. You don’t know who will end up knowing your e-mail address and start sending you stuff that you don’t need or worse, malware. If I were you, I’d set up another web e-mail account that is separate from your main e-mail account.

Remember: There is no such thing as absolute privacy
Whatever you code into your computer and send through e-mail is never ever really totally private. Just bear this in mind when writing anything. It will keep you safe.

Filed Under: E-mail, Privacy & Anonymity, Real-World Issues Tagged With: e-mail security

Some E-mail Security Tips

25 March 2011 By Saran

On-line Communication

How often do you use your personal e-mail? How about your work e-mail? I am willing to bet a huge sum that you can’t even answer those questions because you know that you spend a HUGE amount of time on e-mails. You spend so much time that you can’t even track it – but that’s how it is with most people today. E-mail has become part of everyone’s lives that it is not even given a second thought.

When it comes to security, however, we should give e-mail more than a second thought. Do you know just how many security pitfalls there are when it comes to e-mails? LOTS.

Here, take a look at some of these tips and you’ll realize that you haven’t really been paying attention to e-mail security.

When sending to a mailing list or to many people, use BCC.
B-what, you may ask. You know the two other fields below the TO field? One is CC (carbon copy) and the other is BCC (blind carbon copy). Using BCC means the recipients in the list will not see the e-mail addresses of the other recipients. This is particularly important in the eyes of the recipients who may not want unknown people finding out their e-mail addresses. Perfect situation to use this: when sending forwarded whatnots through e-mail.

Don’t be trigger happy.
That is, when you receive e-mails with links in them, asking you to immediately click on the link for one reason or another, DON’T. Even if you are worried to death that PayPal might close your account for no reason, DO NOT CLICK ON THAT LINK. The chances are that it’s not PayPal. If you really want to make sure, open another window and type the URL manually. Whatever you do, don’t click that link.

Filed Under: E-mail, Real-World Issues, Tips Tagged With: e-mail security

Newer Posts
Older Posts

Categories

  • Backups
  • Cryptography
  • E-mail
  • Firefox
  • General
  • Google Chrome
  • IM
  • Instant Messaging
  • IT Security Basics
  • Malware
  • Network Security
  • News
  • Operating Systems
  • Physical Security
  • Privacy & Anonymity
  • Programming
  • Real-World Issues
  • Review
  • Security Policies
  • Spyware
  • Storage
  • Tips
  • Web browsers
  • Wireless Security