top of page

Search


Cloud and its security
Cloud forms a crucial part of the new technology frontier in business 4.0. Cloud enables work from home at a minimal expenses. Last few...
Apr 26, 20201 min read
11 views
0 comments


Social engineering - A top threat to work from home
No IT infrastructure policies in the home workspace increase the surface area for social engineering attacks. Humans are the weakest...
Apr 25, 20201 min read
13 views
0 comments


VPN and network privacy
Virtual private networks are usually used for privacy purpose. But a VPN is more than that of privacy, It enables anonymity around the...
Apr 25, 20201 min read
3 views
0 comments


How policies secures processes
Security policies define the rules, regulations and procedures for the organization. It is important to have security policy to be...
Apr 25, 20201 min read
7 views
0 comments


5 powerful tools for firewalling
A firewall is a network monitor tool that inspects incoming and outgoing traffic and decides packet parsing based on defined set of...
Apr 25, 20203 min read
27 views
0 comments
bottom of page