Categories
Application Security IT Security Outsourced IT

Remote Desktop Protocol

What is Remote Desktop Protocol? The Remote Desktop Protocol (RDP) is a technical standard for using a desktop computer remotely. Remote desktop software can use several different protocols including Independent Computing Architecture (ICA), Virtual Network Computing (VNC), and RDP. RDP, the most commonly used protocol, was initially released by Microsoft and is available for most […]

Categories
Application Security IT Security

PUPs

What are PUPs? Potentially unwanted programs (PUPs) are software programs that are often installed when other software is being installed on a computer. PUPs often serve as marketing tools and may modify browser settings to display advertisements; this form of PUP is referred to as adware. PUPs differ from other malicious programs such as worms […]

Categories
Application Security

QR Code Security

What is QR Code Security? A quick response (QR) code is a type of barcode that stores information as a series of pixels in a borderless square-shaped grid to be read by a digital device. When a QR code graphic is positioned in front of the lens of a smartphone camera, the code is read […]

Categories
Application Security IT Security

Productivity Tools and Cybersecurity

What are Productivity Tools? With so many productivity tools and applications available, employees are often keenly aware of alternative strategies for collaborating and getting work done. If employees feel that their cybersecurity practices and policies are creating obstacles and slowing them down, they are likely to look for ways around that by accessing other tools […]

Categories
Application Security IT Security Outsourced IT

Networked Medical Device Cybersecurity

What is Networked Medical Device Cybersecurity? The Internet of Things (IoT) is the interconnection and communication between internet-enabled physical devices. The growth of such devices has been explosive, as smart devices such as wearables, sensors, phones, cars, appliances, and household gadgets are becoming increasingly prevalent in more and more aspects of daily living. The proliferation […]

Categories
Application Security IT Security Outsourced IT

Cross-Site Request Forgery

What is Cross-Site Request Forgery? Cross-site request forgery (CSRF) cyberattacks are common web application vulnerabilities that take advantage of the trust that a website has already granted a user and their browser by tricking the web browser into executing an unwanted action in an application that the user is already logged in to. CSRF cyberattacks […]

Categories
Application Security IT Security Outsourced IT

FinTech

What is FinTech? FinTech (financial technology) is a term broadly referring to software, mobile applications, and other technologies created to improve and automate traditional forms of finance for individuals and businesses. A FinTech company refers to any business that uses technology to modify, enhance, or automate financial services for businesses or consumers.1 Examples of FinTech […]

Categories
Application Security

Parameter Tampering

What is Parameter Tampering? Parameter tampering is a type of web-based cyberattack where the parameters exchanged between client and server are manipulated in order to modify application data. Application data such as user credentials, permissions, and prices and quantities of products are often stored in cookies, hidden form fields, or URL Query Strings to increase […]

Categories
Application Security

Data Silos

What are Data Silos? A data silo is a repository of information in a department or application that is inaccessible or not fully accessible by other departments or applications in an information system. An example of siloed data is an information system that has finance, administration, HR, and marketing departments storing their data in different […]

Categories
Application Security IT Security Outsourced IT

Bossware

What is Bossware? Bossware is software to be aware of, whether you have a boss, or the boss is you. Bossware is a term that encompasses any form of employee productivity or performance monitoring software. The pandemic saw a dramatic rise in remote work and a concurrent rise in the number of employers wanting assurances […]