Author Archives: Emmanuel Carabott
How to Control Cyber Slacking
Cyber slacking is a term used when employees use their work internet connection for personal reasons for excessive amounts of time. Cyber slacking can cause a number of problems, from the obvious loss of productivity to legal liability as well …
Internet Monitoring: How, what, why?
Monitoring is a vast subject and it is often difficult to think about everything you can monitor; even worse is deciding what is worth the cost of being monitored and what can safely be ignored. To top it all off …
Unbelievable Security Stories
I was reading a story on Reuters about a security expert who highlighted the point that ATMs (Automated Teller Machines) have certain security flaws that help hackers hit the jackpot. Certainly an intriguing story as I thought ATMs were among …
10 Tips to Avoid Spam
Education is an integral part of security. Educating your employees can be an effective defence against attacks; it can also help save money in some cases. Part of your bandwidth costs is consumed by spam and as such educating employees …
Is Privacy Dead?
With the advent of the internet many people seem to forget about privacy and its importance. Some people claim that privacy is actually dead and has been for a while and we have plenty of examples of people who knowingly …
Do you know the dangers of wireless networks?
I came across a story about an old case from 2007 where hackers infiltrated T.J. Maxx’s wireless network at one of the outlets and stole over 45 million credit card numbers. Those involved got caught and convicted. While it’s true …
Top 10 Security Precautions when using Social Networking Sites
It is impossible and illegal to stop employees from using social networking sites 24/7 and even if it were legal it wouldn’t be a good idea as it could easily alienate your employees. The best course of action is to …
How to secure your network the old fashioned way
Many times we think of security as policies, software, hardware and other such things; however, there is a lot more to it. When securing your network (especially in a large company with multiple locations) it’s imperative to perform log monitoring …
Top 5 Risks caused by employees’ actions
Employees generally do not mean to harm the organization for which they work; however, sometimes due to a lack of due diligence or even lack of education on security employees might pose a grave security risk to an organization. Below …
How to dispose of confidential data
Administrators know the importance of keeping confidential data confidential but sometimes a small lapse can turn the enforcer into the perpetrator. Hardware gets old and needs to be replaced as does faulty hardware; however, what happens to the old stuff? …









