datasecurity

Password Security Measures ii

It is a known fact that we rely heavily on passwords to secure our online accounts in today’s digital world. However, the use of weak passwords or password reuse across multiple accounts makes us vulnerable to cyberattacks. That is why it is essential to regularly perform password exposure tests (PET) to identify weak or compromised …

Password Security Measures ii Read More »

The People, Process, and Technology of Cybersecurity

The COVID-19 pandemic generated an increase in cyber threats. According to a security magazine, Ransomware attacks rose by 92.7% in 2021 whilst comparison to 2020. With an increase in the use of digital technology comes an increase in cyber threats and with each passing day, such threats are evolving, and the need for constant attention …

The People, Process, and Technology of Cybersecurity Read More »

Personally Identifiable Information (PII)

What is PII? The Nation Institute of Standard and Technology (NIST), defines personally identifiable information (PII) as Any information about an individual maintained by an agency, including any information that can be used to distinguish or trace an individual’s identity, such as name, social security number, date and place of birth, mother‘s maiden name, or …

Personally Identifiable Information (PII) Read More »

Ubiquiti says customer data may have been accessed in a data breach

One of the biggest sellers of networking gear Ubiquiti Networks has alerted its customers to a data breach. In a short email sent to customers, the tech company said it became aware of unauthorized access to its systems hosted by a third-party cloud provider. Ubiquiti did not name the cloud company, when the breach happened …

Ubiquiti says customer data may have been accessed in a data breach Read More »

Data Security, It’s role in Network Security

Data Security describes all the processes involved in keeping accounts, databases, and files connected to a network safe by adopting a group of controls, applications, and techniques that identify the relative importance of various datasets, their sensitivity, regulatory compliance requirements then applying appropriate protections to secure those resources. Data security also refers to the method …

Data Security, It’s role in Network Security Read More »