Archive for the "Security" Category

Sort by:

Saving Data with Two Factor Authentication

Today a variety of methods can be used to help protect your information and data that is stored.  However it does seem that as quickly as new methods are introduced to protect and secure your data, new methods for accessing your account become available as well. Using two factor authentication options is a way that […]

Safe and Secure Online Shopping for All

We spend our money increasingly online, and this form of shopping has been a sea change for the retail industry and business in general. Web shopping or e-commerce has made the transfer of money and obtainment of products and services incredibly easy. With the good comes the bad, though. We have always been concerned that […]

EC-Council’s Inaugural CISO Executive Summit Develops Guidelines to Address Challenges of 2012

EC-Council’s Inaugural CISO Executive Summit Develops Guidelines to Address Challenges of 2012’s IT Mantra “Doing More with Less” January 9, 2012 Albuquerque, NM- The New Year brings an unfamiliar set of challenges for executive-level Information Security (IS) professionals. The troubled economy and increased economic uncertainty has led many to seek alternatives to doing more with […]

Top Reasons to deploy an Intrusion Detection and Prevention System

An intrusion detection system is a perfect passive security solution that is especially designed to monitor all inbound and outbound network activity. Undoubtedly its basic function is to identify any suspicious patterns that may indicate a network or system attack from an unidentified object attempting to break into or compromise a system. An intrusion prevention […]

Challenges to Telecommuting Overseas

Working from home occasionally, part-time or full-time is fairly common in many western countries. Many software developers and project managers routinely work full-time from home-office. The benefits are well known – saving hours of commuting time, flexibility, saving on commuting expenses, reduced emissions, etc. One key requirement for telecommuting is the availability of robust and […]