PHONE: (512) 730-1830 HOURS: 11AM - 11PM, Mon-Sat LICENSE: #A05213601

Your Nest X Yale lock may be compromised

Your Nest X Yale lock could be compromised or vulnerable to hacking as a new vulnerability emerged regarding the lock's ability to be unlocked by unauthorized individuals. This security vulnerability was discovered during the course of a cyber intrusion investigation. What are Nest X Yale Locks? For those of you…

Comments Off on Your Nest X Yale lock may be compromised

Reducing attacks on cryptography

What is cryptography and how do you prevent attacks on it? Cryptography is how confidentiality, integrity, authenticity, and non-repudiation can exist in data. This means it provides the mechanism to secure data into unreadable forms by anyone not authorized while allowing the same message to be verified from any given sender as legitimate and non-corrupted. However, it isn't perfect and there are many types of attacks on cryptography.

Comments Off on Reducing attacks on cryptography

Creating a business continuity plan (BCP)

Business continuity planning or a business continuity plan is the formal process of creating a a proactive and responsive plan when handling a disruption in normal business processes. The plan incorporates before, during, and after a disruption occurs with the primary purpose to get business back to normal operations. The article focuses on the planning process and does not incorporate technical procedures or controls.

Comments Off on Creating a business continuity plan (BCP)

End of content

No more pages to load