Categories
Application Security IT Security Outsourced IT

Android Trojans

What are Android Trojans? Android trojans are malware applications that can perform a variety of malicious activities through your Android device. Two recent large-scale Android trojan attacks include: Nexus Android Trojan. The authors of the Nexus Android Trojan have made the malware available to other threat actors via a malware-as-a-service (MaaS) program, where individuals and […]

Categories
Application Security IT Security Outsourced IT

Antivirus Protection

What is Antivirus Protection? Antivirus software protects devices against viruses and malware through a combination of prevention, detection, and removal. Antivirus software can be installed on computers and other devices, such as smartphones and tablets. The two major types of antivirus protection are1: Traditional antivirus protection. Traditional antivirus software relies heavily upon the signature, or […]

Categories
Application Security IT Security Outsourced IT

Application Lifecycle Management

What is Application Lifecycle Management? Application lifecycle management (ALM) refers to the creation and maintenance of a software application, encompassing the people, tools, and processes that manage the life cycle of an application from its conception to the end of its life. ALM is also known as integrated application lifecycle management, as it involves an […]

Categories
IT Security Outsourced IT

GPS Cybersecurity

What is GPS Cybersecurity? As Global Positioning System (GPS) use continues to increase, it is increasingly important that individuals and businesses consider the security of these systems. Many businesses are dependent on the essential systems on GPS to conduct their day-to-day business, making them clear targets for cyberattackers. Unfortunately, GPSs are quite vulnerable to cyberattacks, […]

Categories
IT Security Outsourced IT

Geolocation

What is Geolocation? Geolocation refers to the use of location technologies such as GPS or IP addresses to identify and track the whereabouts of connected electronic devices. Geolocation is often used on portable devices to trackĀ  the movements and location of people and for surveillance. Some examples of how geolocation is used in the financial […]

Categories
IT Security Outsourced IT

Border Gateway Protocol

What is Border Gateway Protocol? Border Gateway Protocol (BGP) refers to a gateway protocol that connects all networks over the internet by enabling the internet to exchange routing information between autonomous systems (ASs). BGP connects ASs, allowing them to exchange information about their reachability. Updated information about reachability can be stored by BGP routers in […]

Categories
Application Security IT Security Outsourced IT

Threat Actors

What are Threat Actors? A threat actor, also known as a malicious actor, is any person, group, or entity that creates all or part of a cybersecurity incident, with the intent to cause harm. Threat actors may cause damage by exploiting vulnerabilities, compromising user identities with elevated privileges, evading security controls, damaging data, deleting data, […]

Categories
Application Security Government IT Security Outsourced IT

Enterprise Resource Planning Systems

What are Enterprise Resource Planning Systems? Enterprise resource planning (ERP) is a system of integrated software applications that manage business processes and operations in many areas such as finance, procurement, distribution, human resources, supply chains, and more. ERP systems are critical applications as they integrate all of the disparate processes that an organization needs to […]

Categories
IT Security Outsourced IT

LAN and WAN Security

What is LAN and WAN Security? Your network connects any number of resources including servers, computers, printers, and more, and makes it possible to share software, information, and files. Network security is critically important as sensitive and confidential information is being stored and shared within your network. Understanding network security risks can help you to […]

Categories
IT Security Outsourced IT

Transmission Control Protocol/Internet Protocol (TCP/IP)

What is Transmission Control Protocol/Internet Protocol? Transmission Control Protocol (TCP) is the default communication method, that is used on top of Internet Protocol (IP), which enables application programs and computing devices to exchange messages over a network. TCP establishes and maintains a connection between the sender and the receiver during the transferring process and its […]