security

How to use Google Authenticator to secure access to desktops

We hear about high profile security breaches frequently. Most of these breaches exploit the system login credentials of end users to get into the company’s network. Therefor, Leading organizations are recognizing this and are beginning to focus on a better secure end user identities. The requirement of enforcing an additional authentication method is at all time

Read More

Security Tip

you can check the strength of your passwords using tools like this http://www.passwordmeter.com/

Read More

What is spyware

Spyware is a type of malicious software that is spread around on the internet. The term spyware is used to describe software that carries out certain behaviours or operations without obtaining user consent. Such behaviours include but are not limited to: advertising, personal information gathering, and even changing computer settings and configurations. Spyware can be

Read More

What is data exfiltration?

Data exfiltration is formally defined as the unauthorised transfer of sensitive information from a target’s system or network by an attacker to another location. Data is always moving around in network this makes it very hard to detect an exfiltration attack which makes it all the more serious and devastating. Such a transfer of data

Read More

Security Tip

use 2 factor authentication to be safe when accessing your e-mails or social media accounts on untrusted or public computers

Read More

Password Hardening

As computer processing power increases the security of traditional passwords decreases due to vulnerability to what is known as dictionary attacks or brute force attacks. These are attacks where an attacker computer puts together a set of passwords and tries them out until your account is compromised. To face this threat the concept of password

Read More

Security Tip

Avoid entering sensitive data like your credit card numbers or any other financial or sensitive information into any public computer.

Read More

Security Tip

Always log out of websites by clicking “log out” on the site. It’s not enough to simply close the browser window or go to another website.

Read More

Password Manager Apps

Today you can’t live in the business world without spending some time online. Your online presence is secured by the passwords that secure your many accounts. The volume of the tragedy that can occur once any of your passwords is compromised needs no description. It is also a well established fact that you simply cannot have

Read More

6 IT Security Tips for Your Workplace

Today’s business are heavily reliant on information technology. Your workstation or PC has become an asset in addition to it being the tool through which your perform. Due to its importance it is very important for you to consider these tips on how to secure your workstation: Gear Up: It is very important from a

Read More

Reach out

Re-Architect

This methodology requires the most effort to implement but it results in the most optimised recurring cost and will provide the best scalability for apps. This involves re-adapting the code of applications and the heavy use of SAAS solutions in order to replace existing hosted applications.

Re-Platform

This method utilizes the power of  PAAS services, like transferring a database to an as-a-service model,  the use of containers for some apps or the use of network/security functions as a service. Greater scalability and lower cost of operation is achieved.

Re-Host (Lift & Shift)

the migration of workloads from  to the cloud without changing the architecture. Machines get to keep their  OS and apps. This is the quickest and easy way to migrate, but since its  utilising IAAS, its is also the most expensive on the long term.