Et Cetera

Tue
09
May

Virtual Private Network

Contributed by Ann Funk

Virtual Private Networks are increasing in popularity every day. This is due in large part to computer users wanting to keep their browsing habits private. The popularity is also due to the fact that VPNs are a relatively low cost, flexible and easy to use. While they may be easy, there is still a lot to learn about VPN’s.

This document is in PDF format. To view it click here.

Wed
03
May

Video Surveillance: Best practices

Contributed by Billy Short

Video surveillance is becoming more and more prevalent in today's enterprise environments. Business factors that include security, accountability and monitoring needs drive the implementation of video surveillance systems. Video surveillance systems help keep company assets safe, monitors organizational processes and ensures accountability throughout the entire facility.

This document is in PDF format. To view it click here.

Mon
01
May

Data Theft

Contributed by Cameron Meyer

Data theft is an ever present and continually growing issue in today’s networked world. Data theft is not simply an issue for individual computer users; it plagues large corporations and governments as well. With this in mind, individual’s privacy and financial standing are at risk in these attacks. Corporations are primarily affected monetarily and when governments are attacked, it can bring on national security issues. Individuals targeted for data theft are at risk of having their identities stolen and potentially suffering personal monetary damages. Corporate data theft has now become one of the most significant concerns for companies of every size and cybersecurity teams are essential to companies in order for companies to be successful.

This document is in PDF format. To view it click here.

Fri
21
Apr

Advantages and Drawbacks to Using Biometric Authentication

Contributed by Stuart Hall

As technology advances, so must the means of heightened information security. Corporate businesses, hospitals and your regular everyday people are relying more and more on technology for conducting business, transferring medical records, on-line banking and other everyday activities such as social medial. As the need for stronger information security arises new technology and means of authentication have been created. Multifactor authentication is a means of authenticating an individual using several different forms of authentication. Some use the term three-factor authentication. Three-factor authentication falls into these categories knowledge, possession, and inherence (Haughn, 2014). I consider this as something you know, something you have and something you are.

This document is in PDF format. To view it click here.

Tue
18
Apr

Open Stack & Open Source Software Vulnerabilities

Contributed by Maxton Richardson

Open Stack is an open source software technology that’s changing and developing the way we do business, but many are unaware of Open Stack technology. According to Business Wire, “The World Runs on Open Stack”. Open Stack is “Backed by some of the biggest companies in software development”. There are “Thousands of individual community members who support the growth, maintenance, & development of Open Stack. Many big industries utilize Open Stack such as the Auto-Industry, media, finance, commerce, telecom, and energy. People all over the world use Open Stack daily, but very seldom people are aware of Open Stack technology. As stated by Opensource.com, “many think that Open Stack is the future of cloud computing.”

This document is in PDF format. To view it click here.

Pages

Subscribe to RSS - Et Cetera