Skip to main content

Posts

My InfoTech Journal!

Network Security: How to minimize the Risk of your Wireless Network

My InfoTech Journal: What you can do to minimize the risk of your wireless network? Access Points are usually targets for unauthorized access. You have to ensure that your access points are secured to prevent unauthorized access.  There are several ways of securing your wireless access points.  Here is a Security Tip from the US CISA. Change default password. Restrict access. Encrypt the data on your network. Protect your Service Set Identifier (SSID). Install a Firewall. Maintain Anti-Virus software.I Use file sharing with caution. Keep your access point software patched and up to date. Check your internet provider’s router or router manufacturers wireless security options. Connect Using Virtual Private Network (VPN). A more detailed discussion of this tip can be found in this post:   US CISA: Security Tip (ST 005-003) Securing Wireless Networks End Notes  US CISA: Security Tip Disclaimer   This article is a result of my personal research and is not a substitute for legal advise.  Ple
Recent posts

Password Security: What are the Best Practices for Password Security

My InfoTech Journal: Password Security  This article is just a reminder on the importance of Password Security . As we become more and more comfortable with using online services like banking, cloud drives for data repository, and other online services, we tend to be more relax and sometimes put our defences down. In most cases, we put our trust on the Service Provider’s security controls.  We oftentimes forget or tend to ignore the fact that these service providers are usual targets by cybercriminals and may one day fall victim to data breach and data leaks. Data leaks may include your account, password, and other personal information. We might not have control over the service provider’s security controls, but as End-Users we should at least take precautionary measures for the things we can control, most fundamental is to ensure a strong password for our accounts. Best Practices for Password Security  These are some best practices that can be useful to you. This article can also be a

Network Security: How to Secure Your Network

My InfoTech Journal: Network Security  To set the context of this domain, I have here several definitions from different service providers. Network Security  refers to the practices of protecting computer network from intruders, including both wired and wireless connections. - US CISA Network Security  is any activity designed to protect the usability and integrity of your network and data. It includes both hardware and software technologies. Effective network security manages access to the network. It targets a variety of threats and stops them from entering or spreading on your network. - Cisco Network Security  combines multiple layers of defenses at the edge and in the network. Each network security layer implements policies and controls. Authorized users gain access to network resources, but malicious actors are blocked from carrying out exploits and threats. - Cisco Network Security  are measures taken to protect a communications pathway from unauthorized access to, and accidenta

What is General Data Protection Regulation (GDPR)

My InfoTech Journal:  General Data Protection Regulation (GDPR) The  General Data Protection Regulation , also known as  GDPR  is regulation under the  European Union (EU) Law  that mandates data security and privacy.  The  General Data Protection Regulation ( GDPR)  was passed by the European Parliament in 14-Apr-2016 and which became  effective on 25-May-2018.  The main objective of GDPR is to ensure that individuals under the European Economic Area (EEA) have control and rights over their personal information. The GDPR also aims to simplify the regulatory requirements for international business. GDPR Protection Principles  1 Lawfulness, fairness and transparency  —  Processing must be lawful, fair, and transparent to the data subject.  Purpose limitation   — You must process data for the legitimate purposes specified explicitly to the data subject when you collected it.  Data minimization   — You should collect and process only as much data as absolutely necessary for the purposes s

How to Improve Employees’ CyberSecurity Awareness (From Weakest Link to Fist Line of Defence)

My InfoTech Journal: How to Improve Employees’ CyberSecurity Awareness (From Weakest Link to Fist Line of Defence) Your Employees may be the weakest link in the CyberSecurity chain,   BUT, You can train them to be part of your first line of defence.  Improving Employees’ CyrberSecurity know-how will depend greatly on your company’s CyberSecurity Awareness Program. This must be aimed to strengthen your first line of defence. There must be a CyberSecurity Awareness Program to ensure everyone is aligned with the company’s principles, policies and procedures. The CyberSecurity Awareness Program should promote everyone’s inclusion and a culture that CyberSecurity is everyone’s responsibility. The CyberSecurity Awareness Courses will also help everyone in the company to be in the same page against malicious attacks. The CyrberSecurity Training should be regularly deployed to the Employees. The CyberSecurity courses should be   designed to include training  Employees on the different human-ba

CyberSecurity Predictions for 2022 and Beyond

My InfoTech Journal: CyberSecurity Predictions for 2022 and Beyond     Today’s post will focus on the latest report released by Mandiant titled “ 14 CyberSecurity Predictions for 2022 and Beyond ”. Mandiant identified 14 predictions which are focused on seven main CyberSecurity threat areas: 1. Ransomware and multifaceted extortion in the spotlight 2. Outlook on major nation-state actors: The Big Four 3. Events in the Afghanistan trigger espionage and information operations 4. Deepfakes: Not just for information operations 5. Cyber outsourcing increases velocity and impact of malicious operations  6. Cloud and Third Parties introduce new chokepoints 7. More internet of things devices, more vulnerabilities, more attacks   14 CyberSecurity Predictions for 2022 and Beyond Here’s a snapshot of the 14 CyberSecurity Predictions for 2022 and Beyond Ransomware and multifaceted extortion in the spotlight 1. No End in Sight: Increased Frequency and Expanding Tactics The Ransomware Threat will c