This page features technical and business related whitepapers covering a range of information security domains.
Every cyber attack, whether from internal or external users is aimed at gaining unauthorized access to sensitive data stored inside corporate databases. Also, most business services today are delivered through the Web and the most serious attacks to Web applications themselves are aimed at gaining unauthorized access to the underlying database technologies. Unfortunately, many organizations do not give adequate attention to securing their corporate databases and many attacks and misuse go unnoticed until it is too late. In order to understand how to protect corporate databases, it is important to thoroughly understand the range of weaknesses and threats that are challenging such vital technology.
Social media platforms create an avenue for people to connect and share information with each other over the internet. These include wikis, blogs, social networking sites such as Facebook, Twitter, LinkedIn, Google Plus, Instagram, Snapchat, Tumbler, WhatsApp etc.
These websites can however pose a threat to individuals, ranging from young kids, teenagers and even adults, all who have access to the social networking sites and hence are susceptible to a myriad of threat actors.
It is therefore important for society at large, beginning with the basic unit, the family, to implement sound security practices and create necessary security awareness for children so as to reduce the exposure & risk associated with social media platforms. This guide covers what you need to know and issues to raise with kids about living their lives online.
Hence the launch of this campaign dubbed, “I’m Social and Secure”.