Articles in this category Cyber Security Principles Terms & Definitions Adequate Security - Security commensurate with the risk and the magnitude of harm resulting from the lo
Top articles Latest articles Hardening Apache with Mod_Security Category: How To What is ModSecurity? ModSecurity is a free and open-source web application that started out as an Apache module and grew to a fully-fledged web application firewall. It works by inspecting requests s... Password Managers Category: General It can be difficult to keep track of the passwords that you use. The temptation is to write them down which isn't a good idea or use the same password all the time. An alternative and better solutio... Anti-Virus Software Category: General Installing anti-virus software is one of the easiest and most effective ways to protect your computer, but you need to make sure you keep the malware definitions up-to-date. Anti-virus software are co... How to protect yourself from ransomware attacks Category: How To How to protect yourself or your organization from ransomware attacks: Use strong passwords with a mixed length of 15+ upper and lower case letters, numbers, and special symbols as login passwords... Account Security Category: General Overview This article contains information on preventing an account compromise as well as how to regain access once an account is compromised. Information Tips to Prevent an Account Compromise Taking... Tips for creating a strong password Category: General Passwords provide the first line of defense against unauthorized access to your computer. The stronger your password, the more protected your computer will be from hackers and malicious software. You ... The Human Factor: How Employee Behavior Affects Cybersecurity Category: General Summary The weakest link in an organization's cybersecurity defenses is often the people. This article examines the role of employee behavior in cybersecurity, detailing common mistakes, the impact of... What is Business Continuity? Category: What Is Business Continuity in CyberSecurity Business continuity is an organization's ability to maintain essential functions during and after a disaster has occurred. Components of a Business Continuity Plan... Cyber Security Principles Category: Knowledge Base Terms & Definitions Adequate Security - Security commensurate with the risk and the magnitude of harm resulting from the loss, misuse or unauthorized access to or modification of information. S... What are the 5 C's of Cyber security? Category: General What Are The 5 Cs of Cybersecurity The 5 Cs of cybersecurity consist of change, compliance, coverage, cost and continuity. If you’re going to create a cybersecurity strategy, you should cover them in ... What is a security.txt file? Category: What Is Summary “When security risks in web services are discovered by independent security researchers who understand the severity of the risk, they often lack the channels to disclose them properly. As a re... Doxing and protection Category: General Overview Doxing (or doxxing), short for dropping dox is the act of searching for and publishing private or personally identifying information (PII) on the internet, typically with malicious intent. Ho...