Archive for December 2015
5 Ways to Improve Your Organisation’s Social Media Security

The BYOD (bring your own device) trend increasingly blurs the lines between personal and company data.
Employees now regularly access work data and social media accounts on their personal devices, or use work computers to check personal emails.
Tuesday, December 29, 2015
Posted by Sivapriya
Reasons Why Your Organisation Needs Computer-Based Security Awareness Training

Considering implementing a security awareness training program? If so, a computer-based training program is well worth consideration.
Whilst not an alternative to a well developed training strategy (security training should be an ongoing.
13 Best Hacking Tools For Android 2015

DISCLAIMER: This
article is written for educational purposes only, and the author Anon.Dos or
the publisher Selvasharing did not publish this article for malicious purposes. If
the readers wish to download these applications and software and.
Thursday, December 17, 2015
Posted by Unknown
Password-maintenance habits.

Cyber threats are growing in volume and sophistication, and company employees are often the weak link within company defences. The increased presence of cyber threats has amplified the necessity of password hygiene from a best practice to a serious.
Wednesday, December 16, 2015
Posted by Sivapriya
10 Benefits of Computer-Based Developer Security Training

Discover 10 compelling reasons why your next developer security training course should be computer-based, and not classroom-based.
1) Fit Training Around Developer Commitments
Application developers work to incredibly tight deadlines, and it's.
Wednesday, December 2, 2015
Posted by Sivapriya