Skip to content
excITingIP.com

Tech Blog & Business Insights

 Menu
  • Home
  • Advertise
  • My Books
  • Video Creation
  • Site Map
  • Home
  • Advertise
  • My Books
  • Video Creation
  • Site Map

Category: Network Security

How Businesses Can Fortify Their Cybersecurity Measures

How Businesses Can Fortify Their Cybersecurity Measures

  • Rajesh K
  • March 1, 2023March 1, 2023

Image Credit: https://images.unsplash.com/photo-1550751827-4bd374c3f58b Cyber threats are commonplace, and every business that operates online is at risk. Regardless of the cybersecurity measures they have in place, there is a chance that...

How to Protect Your Business From Malware Attacks

How to Protect Your Business From Malware Attacks

  • Rajesh K
  • October 6, 2022October 6, 2022

Credit: https://www.pexels.com/photo/person-with-mask-sitting-while-using-a-computer-5380610/ Malware attacks are a massive threat to businesses of all sizes across industries. Cybercriminals use malware to illegally gain access to enterprise networks and computer systems, steal critical...

Applications of VPNs

15 Applications of VPNs (Personal Virtual Private Networks)

  • Rajesh K
  • October 3, 2022October 3, 2022

Are you looking for a comprehensive answer to the question, “Why do I need to use a VPN?” Read a few applications of VPN (Personal VPN) below. But first, What...

How to Identify and Prevent Web Scraping Bots?

  • Rajesh K
  • October 6, 2017October 6, 2017

What are Web Scraping Bots? There are computer programs that automatically visit a website and copy information like content, price, etc. on some/all web pages and pass it on to...

Media Player Apps Can be used to Hack into a System?

  • Rajesh K
  • June 15, 2017

Check Point, in its recent blog post, has reported a vulnerability in existing media player apps like VLC, Kodi, etc. using which an attacker can try and take complete control...

Internal Network Segmentation Firewalls: What are these?

  • Rajesh K
  • July 19, 2016

What are Internal Network Segmentation Firewalls? Most firewalls are placed on the edge of the network, and with a good reason. But what happens once a threat/malicious code passes through...

What is DNSSEC and Why is it Required?

  • Rajesh K
  • June 4, 2016June 4, 2016

DNSSEC (Domain Name Systems Security Extensions) is a set of protocols added to the DNS protocol to enhance security. It serves the following main functions – Authenticates and certifies that...

Ransomware – An Introduction

  • Rajesh K
  • October 13, 2015

What is Ransomware? Ransomware is a malware/malicious software program designed to block or disable access to the data your computer. The program displays a full-screen message on your screen claiming...

Network Sandbox: Handle Zero-day Attacks & Unknown Malware

  • Rajesh K
  • September 28, 2015September 29, 2015

Network Sandbox is a technology that enables organizations to analyze, identify and block zero-day attacks and unknown malware, even before a signature is created for them. Most protection methods depend on...

Encrypted RDP for Non-Mobile Worker Remote Access?

  • Rajesh K
  • July 31, 2015July 31, 2015

When we think of remote access, we think of VPN. But is VPN the only option? Why not use encrypted RDP, especially for giving temporary remote access to non-mobile workers?...

Public Cloud: What Security Can your Business Expect?

  • Rajesh K
  • June 17, 2015

Security concerns are often cited as a reason for not hosting enterprise applications/data on the public cloud. In this post, let’s have a glimpse at the level of security offered...

Book Review: Malware, Rootkits & Botnets – A Beginner’s Guide

  • Rajesh K
  • June 2, 2015

Malware, Rootkits & Botnets – A Beginner’s Guide, written by Christopher C. Elisan, offers a good introduction to information security. Written in a simple language, this book should be useful...

Penetration Testing – An Introduction

  • Rajesh K
  • January 30, 2015

Penetration Testing is the name given to methodologies used to test networks, applications, and even people, for security holes. It is done by trained professionals who identify security vulnerabilities in the...

A Honeypot can be used as a Network Security tool

  • Rajesh K
  • August 15, 2012August 16, 2012

What is a honeypot? A honeypot is an isolated and vulnerable system that is deliberately kept in the network in order to attract attackers, study their method of attacks and...

Rajesh K's Intellifluence Influencer Badge

(c) 2009 to Now by excITingIP.com Masonry Blog, WordPress theme by Perfectwpthemes