Categories
IT Security Outsourced IT

Security Audit Trail

What is a Security Audit Trail? A security audit trail, or audit log, is a set of records that collectively provide documentary evidence of processing used to aid in tracing from original transactions forward to related records and reports, and/or backwards from records and reports to their component source transactions.1 While application logs record activity […]

Categories
Websites

Trust Badges for eCommerce

What are Trust Badges for eCommerce? Trust badges, or trust seals, are symbols placed on a website to let visitors know that the brand is legitimate and trustworthy. Many trust badges indicate verification or authentication by third-party organizations. Online shoppers are more inclined to make purchases from an online store they trust, making trust badges […]

Categories
IT Security Outsourced IT

Security Orchestration, Automation, and Response (SOAR)

What is Security Orchestration, Automation, and Response? Security orchestration, automation, and response (SOAR) solutions help security teams integrate security tools, automate repetitive tasks, and optimize incident response processes, enabling security teams to integrate and coordinate separate tools into streamlined threat response workflows.1 In large organizations, cybersecurity professionals rely on numerous tools to track and respond […]

Categories
IT Security Outsourced IT

Remote Access Security

What is Remote Access Security? Secure remote access is the technology often used by IT personnel who must help their colleagues with tech problems from afar. Remote access is also helpful for workers who need to log in to a secure device that is connected to their on-premises company server while they are working from […]

Categories
IT Security Outsourced IT

Temporal Key Integrity Protocol (TKIP)

What is Temporal Key Integrity Protocol? Temporal Key Integrity Protocol (TKIP) is a security protocol for WLAN networks that was developed to provide an urgent, short-term alternative for Wired Equivalent Privacy (WEP) protocol, which is considered insecure. TKIP was developed and endorsed by the Wi-Fi Alliance and the IEEE 802.11i task group and was limited […]

Categories
IT Security

Push-To-Talk

What is Push-To-Talk? Push-to-talk (PTT) is a system of communication where many people can talk and listen in a group, but only one person can talk at any one time to others. PTT has its origins in two-way land mobile radios which typically featured a ‘push-to-talk’ button. Modern PTT solutions can be used to carry […]

Categories
IT Security Outsourced IT

Root of Trust

What is the Root of Trust? PSA Certified explains the Root of Trust (RoT) as, “…the foundational security component of a connected device. While precise definitions can vary considerably, a RoT can be described as a set of implicitly trusted functions that the rest of the system or device can use to ensure security; it […]

Categories
IT Security Outsourced IT

Fiber-Optic Internet Security

What is Fiber-Optic Internet Security? Fiber internet is internet access that is delivered over fiber-optic connections, as opposed to the copper wire that broadband connections use, or the wireless signals used by satellite connections. Fiber Internet lines are comprised of hundreds or thousands of glass or plastic cables that are roughly 1/10 the size of […]

Categories
Government IT Security Outsourced IT

HIPAA Administrative Safeguards

What are HIPAA Administrative Safeguards? The Health Insurance Portability and Accountability Act of 1996 (HIPAA, PL104-191) was enacted to protect the privacy and availability of health insurance coverage and medical information. The law’s primary goals include protecting health insurance coverage for workers and their families in the event that the insured employee changes or loses […]

Categories
Application Security IT Security Outsourced IT

Android Trojans

What are Android Trojans? Android trojans are malware applications that can perform a variety of malicious activities through your Android device. Two recent large-scale Android trojan attacks include: Nexus Android Trojan. The authors of the Nexus Android Trojan have made the malware available to other threat actors via a malware-as-a-service (MaaS) program, where individuals and […]