Cybersecurity

160

Solutions

11

Articles & Videos

459

Contributors

The Cybersecurity specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. Cybersecurity focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change, theft or destruction. This includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures.

Refine results

Can anyone confirm that a user must have "take ownership" permission on a network share in order for ransomware to encrypt the files?

416 views
Highfive + Dolby Voice = No More Audio Complaints!

Poor audio quality is one of the top reasons people don’t use video conferencing. Get the crispest, clearest audio powered by Dolby Voice in every meeting. Highfive and Dolby Voice deliver the best video conferencing and audio experience for every meeting and every room.

Superb Internet Corp - SSL Certificates

SSL stands for “Secure Sockets Layer” and an SSL certificate is a critical component to keeping your website safe, secured, and compliant.
Any ecommerce website must have an SSL certificate to ensure the safe handling of sensitive information like a customer’s personal and credit card information.

025 views

Part of my domain's WHOIS info shows the following:

Tech Name: Hostmaster, TABNet
Tech Organization:
Tech Street: 5 Financial Plaza
Tech City: Napa
Tech State/Province: CA
Tech Postal Code: 9…

713 views

We have a client who is interested in the most secure mobile phone for communication of email, voice and sms. Also, their employees use Gmail and other consumer apps on their phones and if a way these…

722 views

We have a BYOD estate that's fairly large, approx 3000 devices, mainly iOS.

We enforce a minimum iOS version of 8 via our MAM software. That is, of the user isn't running iOS 8 or above, the corpor…

226 views

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY.
How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...

0330 views

Is there some sort of apps or tools or study that is being used out there for monitoring social networks? A week ago in one of our meeting that topic came up and we were left with the mouth open that …

1251 views

Looking for some recommendations on Email Gateways.  Hoping to catch the attention and get ideas from Exchange Admins, Cyber Security Professionals, folks who work the security field, email is a big o…

440 views

Is an e-mail from Amazon.com a scam attempt or real?

I have an e-mail in my inbox saying it is from Amazon.com, subject: "Your Amazon.co.uk order has dispatched (XXXXX)" (X = numbers and letters).…

1266 views

Hi,


I am victim of UK based company named as "Coinscrypt Ltd" having website : https://coinscrypt.net. I have invested there 3 Bitcoins (i.e. costs INR. 1,78,000 approx.) on dated June 19, 2016. …

7109 views
Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

I know this is a broad question, yet I'm looking for some specific recommendations.
What I would like to know, is about requirements for cyber security.

We have several things in place, but I know…

674 views
cybersecuritty

Read about achieving the basic levels of HRIS security in the workplace.

1237 views

I am posting this question under the security, as I was unable to find any tags in relation to compliance and/or PCI DSS. My apologies about that.

The question is in regards to a call center enviro…

364 views
Cyber or not!

Transferring data across the virtual world became simpler but protecting it is becoming a real security challenge.  How to approach cyber security  in today's business world!

0785 views

Hello Experts,
We are healthcare organization I've been asked to prepare a presentation on Cyber Security and what measures should be taken to protect against any cyber attacks.
Hence, can someone p…

8107 views

Hello,

We are looking for a great saas service where we can scan websurf etc to perfect client computers from for ex ransomware?

We are a msp so we need a multitenant saas provider that can offe…

149 views

Hello Security Experts,

By any chances, can you please provide me with a step by step doc to install and configure Cyber Ark and all main products?

I was unable to find a decent documentation on…

1219 views

Hello,

We've been getting a lot of crypto viruses and hitting our file server. I understand kinda how the threat works. I'm interested if anyone else is fighting against this threat and how you are a…

1184 views

I'd like to implement a Cyber Security Awareness program to better educate my employees on how to spot potential threats.  Is there a online website that offers training such as this in a question & a…

377 views
How your wiki can always stay up-to-date

Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
- Increase transparency
- Onboard new hires faster
- Access from mobile/offline

Hello,

I'm current using Trend Micro OfficeScan as my anti-virus.  Is there a way to configure my workstations (win 7 pro) to disconnect all network connectivity in the event trend alerts there is …

160 views
cloud

Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our businesses and ultimately lives.

0680 views

Getting to know the threat landscape in which DDoS has evolved, and making the right choice to get ourselves gear up to defend against the DDoS attack effectively. Get the necessary preparation works done and focus on Doing the First Thing Right.

074 views
6 motivations of cybercriminals

So, a cyberiminal’s ultimate goal and motivation has to involve financial gain, right?—not necessarily. There are at least five other motivations behind cybercriminal activities.

0638 views

I am running IIS 6.0 with SQL Server.  My site has been hacked.  I fixed, but need to know how to keep this from happening again.  Thank you for your help

72,466 views

Hi expert our there, can someone having practical
experience advise me how to configure, or rather what to
configure with reference to the diagram provided.

(  Diagram : http://web.my03.com  )

It is…

10537 views
Show more content
201506-LO-Top-001

TOP EXPERTS

view all

RELATED TOPICS view all topics

  1. Security
    (22,625)
  2. Network Security
    (6,049)
  3. Vulnerabilities
    (6,559)
  4. OS Security
    (21,405)
  5. Anti-Virus Apps
    (22,033)
  6. Networking
    (88,698)
  7. Encryption
    (6,809)
  8. Software Firewalls
    (19,672)
  9. Web Browsers
    (38,929)
  10. Hardware Firewalls
    (23,099)