Cyber Security

591

Solutions

908

Contributors

The cyber security specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. cyber security focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change, theft or destruction. This includes controlling physical access to the hardware, as well as protecting against the harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures.

Share tech news, updates, or what's on your mind.

Sign up to Post

Think Like An Attacker
It is important to think like an attacker for an individual who is responsible for cloud data security in his or her business. Therefore, here we came with this post to aware users with main points that hackers consider while attempting an attack.
0
CompTIA Cloud+
LVL 13
CompTIA Cloud+

The CompTIA Cloud+ Basic training course will teach you about cloud concepts and models, data storage, networking, and network infrastructure.

Microsoft Office 365 Security
Today we are going to make Microsoft clients aware of tricks and tips used by Cybercriminals to bypass Microsoft Office 365 tenants. Read this post carefully to help you achieve an unbreakable security level in your Exchange Online accounts.
2
G Suite Security and Privacy Settings
With the evolution of G Drive, G Suite, and Team Drives, modifications in tenant settings might be required to fulfill a broad range of customer preferences. Therefore, here we came live with this post to guide Google admins with G Suite privacy and security settings. Let’s begin!
1
Endpoint Breach Prevention
In today’s post, we are going to cover the top 4 best practices that are needed to gain endpoint breach prevention. These measures will help organizations to create a strong endpoint network connection in order to perform secure data transactions.
1
Email Security Best Practices 2019
This post is going to list email security best practices that are essential in order to be safer from cybercrimes these days. The security holder of a business can read this post carefully and then explain the measures thoroughly to their employees.
2
Digital Transformation
If industrial users are looking for focusing upon the digital transformation but have a shortage of resources, outsourcing IT support is the best option here. Enforcing GDPR compliance in business will give relief to people from more than half headache of IT security issues.
1
Business Cyber Security
Small businesses owners and entrepreneurs do not realize the major role of Cybersecurity which can end up as a threat to a well-growing company. Small industrial users need to understand that it is important to acquire security standards to protect their firm from unknown intruders.
1
Cybersecurity Compliance
The cybersecurity landscape appears wide and risky even after enforcing numbers of security standards. From where to begin, when you already have a few measures enforced. Get some assistance regarding Cybersecurity compliance use via this post.
1
Cyber Security
Some enterprises feel that a reactive cybersecurity measure is the best for cloud data security. But, this myth or assumption is totally wrong! Let’s see the reason behind concluding this myth wrong and let’s readout that how can we achieve proactive Cybersecurity in a company.
1
Cyber Security
Cyber Security is one of the biggest concerns for all of us as an individual, a business, an institute, or a government organization. 2019 is the year to take a serious step against Cyber Crime and Cyber Fraud. As a cloud security expert, I enclose some serious points about cybersecurity.
1
5 Ways Acronis Skyrockets Your Data Protection
5 Ways Acronis Skyrockets Your Data Protection

Risks to data security are risks to business continuity. Businesses need to know what these risks look like – and where they can turn for help.
Check our newest E-Book and learn how you can differentiate your data protection business with advanced cloud solutions Acronis delivers

SecPIVOT
Take a step back to reflect where are we now and where we should be heading to in the next (and many more) tranches of getting to implement the RIGHT security. We need to build security PIVOT to stay in the cyber chase with the adversaries.
2
While there were several headline-grabbing ransomware attacks during in 2017, another big threat started appearing at the same time that didn’t get the same coverage – illicit cryptomining.
2
Artificial Intelligence
We’d all like to think our company’s data is well protected, but when you ask IT professionals they admit the data probably is not as safe as it could be.
1
LVL 27

Expert Comment

by:Andrew Leniart
Comment Utility
Great article that explains the importance of not just relying on definitions based security solutions. Thanks for writing this. Interesting read!

Endorsed.
2

Expert Comment

by:Channing Oliver
Comment Utility
Great article, I have long thought about how an AI solution in this area could help reduce the time spent dealing with threats. At the speed AI is progress I think AI security is much closer than ever.
0
In April 2018, the "SamSam" ransomware attack crippled the city of Atlanta. The recovery that followed provides a stark reminder of the real costs associated with ransomware – both technologically and financially.
0
On Sunday 16th September 2018 at 9.30am, Premium Credit - a number one insurance premium finance company in the UK and Ireland came under cyber attack.
0
LVL 5

Author Comment

by:Adrian McGarry
Comment Utility
Thanks Andrew
0
LVL 5

Author Comment

by:Adrian McGarry
Comment Utility
Thank you Andrew
0
ITSec vs CSec
I am sure that most of you will have chanced upon either of the terms like "Information (IT) Security" and "Cybersecurity" but do you know the differences and the implications as those threats evolve? Find out more in this article on the different security approaches that should be adopted.
2
Trade off - web cache poisoning
Web cache has been one of the performance options but though it serves well in enhancing the user experience, it can also inadvertently act as a point for attacks if it is not secured to reduce the exposure. Read on to find out the hidden threats in web cache.
2
LVL 27

Expert Comment

by:Andrew Leniart
Comment Utility
Bernard, this is excellent information written in a way that even a layman to the topic has a chance to understand. Please keep them coming.

Endorsed!
1
Wifi Flaw
Nothing is ever secure - things get "broken" but not always easily mended. This is the norm today. Despite security measure put in place, cyber attacks are still successful because security controls themselves can be vulnerable as well. Catch this Wi-Fi security weakness run through.
5
Secure HTTPS
HTTPS is an essential technology and the Chrome browser developed by Google now shows “Secure” in the address bar when you visit a page with the HTTPS protocol such as https://www.experts-exchange.com but what does this mean? Is the website secure from malware? Is our identity secure?
0
Build an E-Commerce Site with Angular 5
LVL 13
Build an E-Commerce Site with Angular 5

Learn how to build an E-Commerce site with Angular 5, a JavaScript framework used by developers to build web, desktop, and mobile applications.

online safety

A recent Pew Research Center study reveals that one in three parents expresses concern about their children’s online activity. In today’s digital world, understanding the online activity of children is part of being a parent. Most people understand that virus protection and software updates are important for preserving online security. However, the personal habits and actions of young Internet users can affect their safety. 


Busy parents don’t always have time to stay informed about the latest Internet threats, making cybersecurity experts an invaluable resource for providing online safety information about protecting children and young adults. Still, parents must remain vigilant in staying informed about what social media platforms their children use as well as explaining the primary tenets of Internet safety.


Parents, as well as young Internet users, need cyber safety education. It’s important that youth understand how their social media activities affect their safety. It’s impossible to know who is reading and following media posts left by children, and security is often the last concern on the mind of an unsuspecting Internet user engaging with friends and family members.


Most parents make it a point to always know the whereabouts of their children. The same concern should apply to online activity. Parents should have a presence in their children’s gaming networks and social media platforms. Additionally, parents should have the account and password information of their children’s online accounts. Not to spy, but to verify their activities. Furthermore, it’s incredibly easy for unscrupulous individuals to track the real-world movements of children as they check into venues using online applications by using social media platforms such as Instagram, Snapchat, Facebook, and Foursquare. 


Keeping Kids Safe in the Digital Domain


Parents should do their best to teach their children about online safety. However, it shouldn’t be left to parents alone to keep their children safe online. Community advocates and cybersecurity specialists can pitch in and do their part to help keep kids safe in the digital domain. Additionally, there are paid services that parents can use to help protect their children online. Most computer literate children understand how to protect their online privacy and security. However, they only use this knowledge to keep their parents from observing their online activity. 


Unfortunately, most children don’t apply this same caution when engaging with strangers online. Just as they do in the real world, parents must figure out how to oversee their children’s Internet activity. Additionally, it’s important that they establish online monitoring while children are young so that it’s easier to protect them as they grow older.


Research shows that parents are the best defence for protecting kids, teens and young adults online. Parents can establish a foundation for monitoring their children’s Internet activity by explaining that they want to share in their online experience, not infringe on their privacy. This process is easier if parents maintain an ongoing dialogue with their children about Internet safety. Parents must make sure that their children understand how their online activity exposes personal information about their lives that build up over time. 


Getting Help With Cyber Safety


Social monitoring apps and other resources can help parents stay informed about their children’s online behaviour and keep them safe. Experts recommend that parents monitor their children closely to protect them from inappropriate content and activities such as cyberbullying and online predators. Sometimes, dishonest individuals pose as children online. They may even encourage children to divulge personal information, such as their home address and phone number. In light of these threats, parents should always be aware of their children’s online activities, including the information that they share and the people that they engage with online.


All parents want to keep their children safe as they explore the Internet, learn new things and engage with others from around the world. There are many academic institutions, community organizations and law enforcement and government agencies that provide resources that teach parents how to protect children as they browse the Internet. In fact, there are many directories with hundreds of resources from around the world that are updated frequently, and many of those resources are available in different languages.


In today’s digital world, it’s vital that parents maintain an open dialogue about Internet safety. Additionally, it’s important that cybersecurity experts advocate for the safety of children as they use the Internet to enhance their lives. Cybersecurity experts are well aware of the dangers that children face online, and as new threats emerge daily, they continue to develop innovative solutions for protecting the public’s safety. 



0
The biggest challenges when it comes to mobile security: protection, integration and visibility.
6

Expert Comment

by:Jake Lees
Comment Utility
Nice post. Love to read it.
1
Mobile security
Your smartphone is the weakest link so if we have not been taking good care of it and looking out for signs of red flag that the it is misbehaving and acting strangely, then we are setting ourselves for trouble. Read on for tips to self defence and keep a clean hygiene footprint.
3
LVL 69

Author Comment

by:btan
Comment Utility
Thanks Andrew.

1a. Facial spoofing attacks can easily launched via printed photos, video replays and 3D masks of a face. There is a detailed paper written on this. That is why it is critical to implement strong liveness detection measures for facial authentication that recognize when a facial image is not a live. To share a bit more, spoof detection can be classified as either “active”, requiring interaction with the subject, or “passive” analysis requiring no interaction.  

1b. Fingerprint spoofing attack can easily be fooled by fake fingerprints digitally composed of many common features found in human prints. Likewise another paper shares the details. What I think is concerning is the capture in the past has also been attempted on gummy fingers that is fake Fingers. Liveness test is still the added assurance check needed to have a robust check in the mobile device.

The challenge for a/m is not on the detection technology but how to more towards a more accurate match rate an d at the same time not in the expense of making the device bulky or more draining to the limited battery level.

2. Actually remote wipe is more of a mitigation as ultimately, if the data remain encrypted and the device has lock enabled, access is restricted and even data siphoned off the shutdown or locked device will not necessary have the plain data revealed. So with encryption and locked setting, the mitigation suffice as baseline.

Hope the above clarifies.
1
LVL 27

Expert Comment

by:Andrew Leniart
Comment Utility
Thanks for clarifying btan. Highly useful information!
0
Secure Mobile DNA
The explosive trends of the increasing number of mobile devices and apps get us in trouble despite the benefits they give. Run through the common threats faced. Tackle them with a strategy to better secure our mobile device and apps against these emerging threats.
0
HIVE ALERT!
With a HIVE alert mind, we can focus on important security areas. We can ask the right questions to guide and discover ways to reduce our risk footprint and protect against lurking threats. Read on...
0
Ransomware
Ransomware is a malicious software that encrypts a victim's data and makes it unusable until the victim pays the attacker a ransom fee in Bitcoin. Ransomware uses cryptography technology. Attackers decrypt the files only if the victims pays the bitcoin amount within a certain period of time.
0
LVL 8

Expert Comment

by:Naveen Sharma
Comment Utility
Thanks for sharing.

Ransomware attacks are becoming problematic for both individuals and businesses of all sizes.

The best and the most important mitigation techniques is to maintain secure backups and educate your employees.

Ways to Address Ransomware Attacks in Today’s Security Landscape:
https://www.lepide.com/blog/nine-ways-to-address-ransomware-attacks-in-todays-security-landscape/

Simple things you can do to protect against ransomware attacks:
http://expert-advice.org/security/ways-to-protect-yourself-from-ransomware-attack/
0

Cyber Security

591

Solutions

908

Contributors

The cyber security specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. cyber security focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change, theft or destruction. This includes controlling physical access to the hardware, as well as protecting against the harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures.