Skip to main content

Posts

What Is Secure Web Gateway???

In order to setup the web Gateway in an organization in a securely manner, first thing that the implementation team need to understand is the organizational needs. Implementing the web Gateway in an organization in a securely manner is the most important and the challenging task as most of the alerts comes from the web only. The traditional firewalls are not smart enough to stop or defense against the modern virus attacks. Now a day’s most of the virus or attacks come from web. What is Secure Web Gateway (SWG)? A secure Web gateway is a type of security solution that prevents unsecured traffic from internet (Outside network) entering an internal network of an organization. It is used by enterprises to protect their employees/users from accessing and being infected by malicious Web traffic, websites and virus/malware. It is generally implemented through a hardware/software gateway device. Some of the Web gateway application level control, data leakage prevention and virus/m
Recent posts

Malware

The main objective of this module is to provide you the knowledge about various types of malwares. This topic will covers Trojans, Virus, backdoor, worms and the way they works, spreads to the system from internet, their symptoms and their effects. This section will also guide and tell you how to protect the devices and assets from malware infection. What is malware? Malicious Software in short is called as Malware. Malware is a can be a short program, code, software that has the power to interrupt or to disturb the normal processing of either a standalone computer or a group of computers connected together (Network) with the aim to fetch the important information or to keep the track of your activity or to provide the control of the computer to the attacker hands. The Virus, Backdoor, Trojans, RAT, Spyware, and Adware they all fall under the malware. The malware are designed only to cause harm to the computer. Some of the malware ( Virus ) are designed in such a way if the

DoS Attack: - Don’t let your network to be a next victim

Understand the Dos Attack, how it can cause damage to the network.  Internet the network of a network was the wonderful result of many geniuses and intelligent guys who has changed the world totally. Now a day everyone is free to access the internet from any corner of the world and with any devices. It is not secure to surf on internet as the internet is now is the hub of infections like: - viruses, worms, attacks, malwares and most important the hackers. No one is secure if you are surfing on internet you must have to keep in mind what to do and what not to do then only you are secure otherwise not. Everything is now digitalized, no need to go anywhere sit at home and do what you want to do, if you want to pay the bills (electricity, telephone, mobile) pay it online, you want to do shopping go to online shopping site do it and get your product delivered at your footstep, you need to buy a electronics purchase online, why to go to bank to transfer money do it through internet b

Take Email Security seriously

Now a days Email or Electronic Mail has become the important part of entire organizations as well as per personal life, now a days 5-10 % are dependent or relays on postal mail. Approximate 1000’s of the mails are send & received by each of the organizations related to work as email has made our life easy, fast and convenient, we are  now able to get response of our mail within a second. Now a day’s as a technology is changing we have to take the security of our IT assets or resources seriously most important is of Email security. Now a days hackers are creative and they can create mail which look life professional mail (either from bank, form other organizations) asking for your personal details. Some hackers make a fraud mail which looks like professionals’ mail having the attachments photos or something else at the backend bind with virus so as soon you open the mail system got infected with virus and can be a risk to entire network. Organizations have to provide the awareness

Best Practice for securing the organization network.

The best and most important practice is the creation and enforcement of I.T security policies, there must also have the system specific rules to address the policies for the individual systems & data. The policies can address or point to any security controls from password to backup, applications to servers. The most important of all is the proper use of the I.T resources. Each and everyone in the organization must have to understand his responsibility, must use the I.T resources in a limit. All the I.T security policies or other policies have to be available in the organizations intranet. The best of all practice is to have DMZ (Demilitarized) zone . DMZ is logical network separating LAN ( Local Area Network ) from the Internet ( Untrusted Network. ). DMZ provides the extra layer of security as it restricts the attackers or someone else to access the internal servers and data via internet. Any service that is being provided to users on the Internet should be placed in the DMZ. T

How To Speed up the Computer

There are many factors that my cause to run computer slow it may be related to the software or hardware, sometime due to viruses, malwares. This article will guide you step by step instruction how to speed the computer. Uninstall Unnecessary Programs Uninstalled the unnecessary programs that is not needed like games, trial version antivirus or any other software that is not needed as they takes a lots of disk space. Remove the Temporary Files In order to increase the web browsing, web browser stores the visited web pages on computer hard-disk, this page are stored in a temporary internet files (cache) folder. When this folder fills up to much data the performance of computer can suffer. So it’s good to delete the temporary files. Go to run type %temp% hit enter. Then the screen will open displaying temporary file you can deleted it. You will find Temporary folder. C:\Users\Xyz\AppData\Local\Temp Xyz is the user name, but you have to unhide the AppData by clicking

Best practice to keep online surfing/transaction safer.

As the time is passing day by day, year by year so the technology is also changing and among them is the internet making reach to the so far area around the world. The internet has made a drastic change from last few years and has change the entire world. Now approximately 90% of the world population is dependent on internet, connected to internet, as it is a modern (Technology) era everyone is using their own handheld devices ( Mobiles, Tablets, Laptops ) having internet connectivity. Now a day’s business are also going online ( E commerce ,  E Business ) simply go to internet search the sites ( service provider sites ) select the product you wish to buy, add to card & make payment ( Cash On Delivery (COD), Online payment ) in easy steps the product is yours, ok this is little bearable/acceptable, now what if you don’t have the time to go to bank to open a bank account or to deposited the cash? No need to worry this is technology era banking sector has also started this facil