Category: Uncategorized
Category: Uncategorized
Identifying the IT Infrastructure for IT Security
As you can see in today’s world, so many devices are now classified as a computer. In the past, people think that the computer is the big bulky device you see on tables in many offices and organizations. You are right. Those devices are still considered computers. However, many other devices are now behaving and
Read MoreThe Human Factor in a Ransomware Attack Part-1
Multifactor authentication requires that the user of a system use a combination of factors to authenticate or confirm a right to access a system. In some systems, two types of authentications are required while in some other systems, more than two are required. The most common type of authentication is the username and password. The
Read MoreChallenges of Social Engineering
Social engineering has been described from many perspectives, but it is not a new concept. Social engineering refers to a deceptive activity that is used to trick a victim or a person into taking certain actions that may be beneficial to the attacker and detrimental to the victim. Social engineering has been used all the
Read More