According to a recent IDC report the expected value of the U.S. cloud market will Continue reading “Cloud Services – Golden Times Still Ahead?” »
Spyware is defined as malicious software (malware) and data collection programs sometimes called “Spybots” or “Tracking Software”, which secretly collect information about the user. Spyware may be designed for advertising – also known as adware – that consistently contains components for tracking and reporting user information. Finally, spyware may be set-up for changing the configuration of a computer.
In general, the gathering of information about a person or organization occurs without their knowledge. Continue reading “Spyware – Who is watching you?” »
Sending spam messages is called spamming. People who send spam are called spammers collecting email addresses from numerous sources but, furthermore, buy them from email addresses selling companies. Continue reading “Cyber Security Threats VIII- SPAM” »
The cloud can be a very unsafe place when data and data transfer isn’t sufficiently protected. Online commerce transactions, web registrations, search engine submissions, Web polls, e-mail service registration and other automated services may be ‘attacked’ by malicious software programs or bots that mimic humans behavior having the intent of identity theft, spam, data manipulation and harm to businesses etc.
There are several approaches that make registrations and data transfers more secure such as CAPTCHAs. Continue reading “CAPTCHAs – Are you A Person?” »
Passwords and personal identification numbers (PINs) are required everywhere where computers and mobile devices are used and data needs to be secured.
Passwords and PINs are the first line of defense against cyber-crime protecting personal information including financial information, health data and private files and alike. In business passwords are essential to secure trade secrets, financial data, intellectual property, customer lists, employer information etc. Continue reading “Passwords and PINs – The Entrance to Data Security” »
Security of digital data is critical.
Data needs to be managed correctly and must be flexibly stored, moved and provisioned while it needs to be easily accessible and securely protected from data theft and malware etc.
Besides local storage, the most common and favorable from of data storage is in a data center also known as Infrastructure as a Service (IaaS) since for most companies, it is not rational to invest into hardware that may be out-dated within 6 months. Continue reading “Data Center Design” »
Network security for each business is becoming more and more complex, as the number of internet threats drastically increase – daily or even hourly.
Each company, no matter whether a small business or a big enterprise, needs multifaceted security setups to defend its networks and computers against the increasing internet threats such as viruses, worms, Trojan horses, spyware, Denial of Service (DoS) attacks etc. This article focuses on Trojan horses. Continue reading “Cybersecurity Threats VI – Trojan Horses” »
A computer virus is defined as a program that potentially causes damage to hardware, software or any data within a network. For businesses, it can drastically damage business operations, cooperation and client-vendor relationships. Continue reading “Cyber Security Threats IV – Viruses” »
Moving a software application to the cloud merely means running it in the web rather than on the traditional data center infrastructure.
The main advantages to migrate data and software operations to the cloud include Continue reading “Migrating the Cloud” »
Cyber security is one of the most important research areas for the military, government and businesses in the U.S. It includes the protection of data and intellectual property from theft, corruption, or disastrous manipulation Continue reading “Cyber Security Threats – What they are” »