Category: MY WRITINGS

  • TYPE OF BIOMETRIC AUTHENTICATION METHODS, THEIR ADVANTAGES AND DISADVANTAGES

    Retinal Scan: It is one of the highly secure method to identify individuals based on the pattern in the retina.

  •                              SECURITY THREATS AND MEASURES

    When it comes to threats , organisation may face with physical threats alongside of network and system security. Having only network and digital security posture companies and organisation need to provide physical security to prevent any possible intrusion. Lets dive into well-known physical security threats. How to prevent ?

  • MITIGATING DAMAGE AFTER A DATA BREACH

    A data breach can have massive impact on organisations including financial and reputational loss and legal penalties.  To lower the impact of the damage, it is essential to have some sort of incident response plans and disaster recovery plan. Here are some key steps that can be taken after a data breach: WHITE LISTS AND…

  •                               BACKUP STRATEGIES AND THEIR IMPORTANCE

    Regular backups are lifesaver against any possible unexpected events such as hardware failures, cyber-attacks, deletions accidentally. But we have robust backup strategy that provides us with multiple copies of our data on different locations. It is important that we have spare locations or devices that we can keep copy of our data against any possible…

  • FIREWALLS

    When it  comes to network security systems, firewalls are essential as they help security specialists or users to monitor and control incoming and outgoing internet traffic. To do so, we should have whitelist that includes secure and trusted IP addresses, applications and remote or local users. This action prevents unauthorised access and mitigate possibility of…

  • IDS, ACCESS CONTROLS and AUDITING

    Detection tools work very similar to our home security systems. We have security systems to protect our home from any possible intrusion and unauthorised and unwanted access same like companies and organisation have cybersecurity tools to prevent intrusion and unwanted access to protect their assets and network infrastructure. The goal is to detect potential malicious…

  • FIREWALLS

    Firewalls act like a gatekeeper for your personal digital world which means they monitor your network traffic and decide whether allow or block access attempts. It is highly recommended that you have firewall either software or hardware based as cyber-attacks are common nowadays. Let’s talk about features of commonly used software-based Firewall! Software-based firewalls are…

  • ROBUST PASSWORD POLICY

    When it comes to security in digital world, our passwords play an important role. To create a secure password, we can follow some rules that can help us to do so. A good policy may contain these following rules: In addition to these rules above we can also follow these security measures Let’s create a…

  • Disney Data Breach

    Disney Data Breach Hacking group called “Null Bulge” has managed to access to internal company Slack messages sent by employees of Disney. The messages size was 1.2TB of data. This was a form of cookie hacking. When it comes to preventing this type of breaches, here are some solutions. Data Encryption and Identity Verification Data…

  • Data Breach

    Data Breach

    Imagine one day you wake up and receive an e mail telling everything about you? Does it sound scary?In today`s world we almost share everything in digital world even if we think that everything is encrypted. But is it safe enough not to be breached?My topic of the week is about “data breach.” To briefly…