Search
Wednesday 15 August 2018
  • :
  • :

What To Do In Case of A Data loss Disaster

Data loss is an event where information contained in an information system, i.e., computer, USB drive, server or mobile phone is destroyed...

Why Information Security Can Be Enhanced With 3D Visualization Tools

The amount of data being analyzed on various networks has dramatically increased over the years, thanks to big data technologies that are...

Characteristics of a Robust Access Control System

Access controls systems are designed to keep any premises such as businesses and residential ones secure, by prohibiting unauthorized...

More Hospitals are Opting for Third-Party Vendor Credentialing Services

With the growing healthcare regulatory environment, hospitals are now required to perform a regular monitoring on individual persons and...

Elements of A Strong Healthcare IT Security Strategy

A report released by Reuters in 2014 stated that your sensitive health information is 10 times more valuable to hackers than your credit...

Top 3 Biggest Information Security Threats

Today, the growth of technology has improved internet connectivity, which has, in turn, allowed more creativity in business than ever...

Cyber Security Trends in 2017

In January 2017, D-Link Corporation together with its US subsidiary were sued by the TFC. In the lawsuit, TFC claimed that D-Link failed to...

Cryptography and Network Security Principles and Practice

In introduction to cryptography and network security, you learn that cryptography translates as “secret writing”. It refers to the...

Introduction to Cryptography with Coding Theory Solutions

People are always fascinated with keeping information away from others. As children, many of us had a way of exchanging coded messages with...

cryptography

Cryptography and Steganography

Cryptography is the study of concealing information. It is used when communicating over an untrusted medium like the internet. Such mediums...