Category Archives: Tech Zone
Cloud computing – Security Implications: The Client Perspective
In the previous article on cloud computing we considered what to look for and what questions to ask security wise when looking for a cloud service provider. In this article we’ll look at what steps we can take to ensure …
Cloud computing – Security Implications: The Service Provider
One does not need a crystal ball to deduce that cloud computing will be the next big thing and because of this there needs to be some re-thinking of a company’s security strategy in order to safeguard the company data. …
Securing your environment from the threats you actually paid for
Every business IT infrastructure requires tools. Obviously no one company develops every tool it needs in-house and at one time or another every company will end up buying software. Sometimes we take the software we buy for granted and this …
The Importance of an Effective ITIL Change Management Process
Technology and the IT infrastructure are constantly changing and advancing. This means that at some point a company will need to go through a change management process to keep up to date with the latest technologies.
Who’s watching the watchers?
Security has a bit of a dark side. When people are given power over other people there often seems to be the urge to abuse that power. We have previously covered the scandal in which a school used webcams on …
Protecting your employees from themselves
Scams are getting bolder and more intelligent all the time. Recent the BBC broke a story about a new scareware malware which exploits people looking for pornography. The malware which masquerades as a pornographic game once downloaded and run takes …
Secure SHell (SSH): making life easier
SSH is a very useful tool for anyone using Linux Environments. It’s a secure way to log into a machine remotely but can also do a lot more. With SSH one can create tunnels – that is have the local …
Security: Is it really necessary? Does it justify the cost? Or is it all FUD? (Pt. 3)
This is the final segment in this three-part series where we have looked at the importance of security within an organization; the different types of attacks that could occur and the motivation behind these attacks. What should one do? This …
Security: Is it really necessary? Does it justify the cost? Or is it all FUD? (Pt. 2)
In the first part of this series we discussed the different security attacks that a business needs to protect against. What about motivation? Why would anyone attack my business? Financial motivation is the most obvious reason. The attacker simply wants …
Security: Is it really necessary? Does it justify the cost? Or is it all FUD? (Pt. 1)
Security is a tricky subject; you get people who push for security and other who claim that it is all a waste of money. What is the truth? Is security really worth the investment? Will organizations get something in return …









