Category: Security

  • How to Keep Malware Out of Your Printers

    How to Keep Malware Out of Your Printers

    The landscape of cybersecurity is always changing, and new threats are constantly emerging.   One of the newest – and the most interesting, if you are into that kind of thing – is the rise of printer malware. This type of malware started to be reported in November 2017, when Barracuda Labs saw an attack […]

  • Is Blockchain a Permanent Fixture in the IT Industry?

    Is Blockchain a Permanent Fixture in the IT Industry?

    By Des Nnochiri   In essence, the nature of business comes down to different companies exchanging value with supplier, partners, and customers. By “value”, we mean goods, services, money, and data. This is the fundamental basis of any business and it has to do this effectively in order to make a profit and survive.   […]

  • Three Cybersecurity Trends for 2019

    Three Cybersecurity Trends for 2019

    By Des Nnochiri   From online banking, insuring cars, and shopping, we are almost totally reliant upon the internet to complete daily tasks and make our lives easier.   However, as technological advancements give us greater convenience, increase productivity, and provide greater access to whole new swathes of entertainment, consumers and businesses alike leave themselves […]

  • When Should You Host Applications Onsite?

    When Should You Host Applications Onsite?

    By Des Nnochiri   When it comes to hosting applications, business and IT administrators often need to make tough decisions as to whether cloud hosting or retention of the software at their own data center is the preferred option. Public cloud hosting may have the edge in terms of scale and distribution, but there are […]

  • Protecting Your Privacy in Windows 10

    Protecting Your Privacy in Windows 10

    By Des Nnochiri   Justifiably or not, Microsoft’s Windows 10 has gained the reputation as an operating system that doesn’t respect your privacy as much as it should. If you or your organization are Windows 10 users, this guide will assist you in protecting your privacy during day-to-day operations.   Turn Off Your Advertising ID […]

  • Toughening Security for Linux Servers

    Toughening Security for Linux Servers

    By Des Nnochiri   As with any other operating system, security is a prime concern with Linux network hardware. In this article, we’ll be giving some recommendations on how to toughen the security posture of your Linux servers. Screenshots and example syntax relate to systems running Kali Linux, CentOS, RHEL, Ubuntu, and Debian-based Linux distributions. […]

  • How to Strengthen Security on Windows 10 Networks

    How to Strengthen Security on Windows 10 Networks

    By Des Nnochiri   The Windows 10 operating system has had a reputation for poor design and lax practices on information privacy and security for some time. It’s debatable exactly how bad the OS actually is or isn’t in this regard. In this article, we’ll be exploring some methodologies and best practices for hardening the […]

  • Best Security Practices for Enterprise IoT

    Best Security Practices for Enterprise IoT

    By Des Nnochiri   Internet of Things (IoT) security ranks as a major concern for many enterprises. A 2018 survey of over 600 IT decision-makers worldwide conducted by 451 Research found that 55% of those polled rated IoT security as their top priority. It’s easy to see why. As well as any “smart, connected” devices […]

  • Cyber Security in the Movies – Is It Realistic?

    Cyber Security in the Movies – Is It Realistic?

    By Des Nnochiri   Hacking in the movies looks so cool. Someone with a keyboard and five screens frantically types in some code, and a few seconds later: “I’m in.” That’s it– they now have all the information they need to access nuclear missile codes, blackmail a billionaire, or completely shut down a building’s security […]

  • A Quick Guide to Encrypted Messaging

    A Quick Guide to Encrypted Messaging

    By Des Nnochiri   With it now being so easy to share information, we have a tendency to over-divulge. We check into public places online, tell the world when we’re going on holiday and where, and send and receive risqué photos. However, when it became public knowledge that the NSA, internet service providers, and trusted […]