Categories
IT Security Outsourced IT

Full Disk Encryption

What is Full Disk Encryption? Full disk encryption (FDE) or whole disk encryption is a means of protecting information by encrypting all of the data on a disk, including temporary files, programs, and system files. Some full disk encryption systems leave the boot sector of the disk unencrypted, while others encrypt that as well. Following […]

Categories
IT Security Outsourced IT Websites

XML Encryption

What is XML Encryption? Extensible Markup Language (XML) lets you define and store data in a shareable manner. XML supports information exchange between computer systems such as websites, databases, and third-party applications. Predefined rules make it easy to transmit data as XML files over any network because the recipient can use those rules to read […]

Categories
IT Security Outsourced IT

Computer Forensics

What are Computer Forensics? Computer forensics, also known as digital forensics, computer forensic science, or cyber forensics, combines legal forensics and computer science to gather digital evidence in such a way that it is admissible in a court of law. Computer forensics is closely related to cybersecurity. Computer forensics findings can help cybersecurity teams speed […]

Categories
IT Security Outsourced IT

Quarantined Files

What are Quarantined Files? Quarantine is a special isolated folder on a machine’s hard disk where suspicious files detected by antivirus and antimalware software solutions are placed to prevent further spread of threats. Quarantine allows users to review suspicious and potentially dangerous files from all machines and decide whether they should be removed or restored. […]

Categories
Application Security IT Security Outsourced IT

Object Linking and Embedding Malware

What is Object Linking and Embedding Malware? Object Linking and Embedding (OLE) allows users to create and edit documents that contain objects created by different applications. OLE technology gives users the ability to create compound documents that support a host of software applications, such as Microsoft Windows applications, Corel WordPerfect, Adobe Acrobat, AutoCAD, and multimedia […]

Categories
Application Security IT Security Outsourced IT

Email Protocols

What are Email Protocols? An email protocol is a group of rules and regulations that ensure that email messages are properly created, transmitted, and received between different servers, machines, and email clients. Email protocols create standards that messages should follow to reach the recipients in their original state. The following are the three standard email […]

Categories
IT Security Outsourced IT

Network Time Security

What is Network Time Security? Network Time Protocol (NTP) is an online protocol dating back to 1985 that synchronizes computer clock times in a network to within a few milliseconds of UTC, allowing devices connected to a TCP/IP network to work at the same adjusted time. NTP is the most common way to receive time […]

Categories
IT Security Outsourced IT

Temporal Key Integrity Protocol (TKIP)

What is Temporal Key Integrity Protocol? Temporal Key Integrity Protocol (TKIP) is a security protocol for WLAN networks that was developed to provide an urgent, short-term alternative for Wired Equivalent Privacy (WEP) protocol, which is considered insecure. TKIP was developed and endorsed by the Wi-Fi Alliance and the IEEE 802.11i task group and was limited […]

Categories
IT Security Outsourced IT

Technical Security Controls

What are Technical Security Controls? Technical security controls, also known as logic controls, use hardware, software, and other technologies to improve an organization’s security posture by reducing vulnerabilities. Technical security controls can be used to achieve many different types of goals1: Examples of technical controls include: Access Control Lists (ACL). ACLs are network traffic filters […]

Categories
IT Security

Push-To-Talk

What is Push-To-Talk? Push-to-talk (PTT) is a system of communication where many people can talk and listen in a group, but only one person can talk at any one time to others. PTT has its origins in two-way land mobile radios which typically featured a ‘push-to-talk’ button. Modern PTT solutions can be used to carry […]