Blog posts
All my blog entries to date
2020
Week 5 Megapost - Implementing security measures to protect corporate data
Hardware security protection, Firewalls, Data breach mitigation and Access Control Lists Continue reading Week 5 Megapost - Implementing security measures to protect corporate data
Backups and data recovery
Read here about different types of backups, data recovery and biometrics Continue reading Backups and data recovery
Firewalls and IDSs
Types of Firewalls and Intrusion Detection Systems Continue reading Firewalls and IDSs
Advantages of having an encrypted email
Encryption, Zero-Access, Data Centers explained and personal thoughts Continue reading Advantages of having an encrypted email
Identity theft. Consequences of medical identity theft and other data breaches
Description of identity theft and its consequences for both individuals and companies Continue reading Identity theft. Consequences of medical identity theft and other data breaches
Top 5 Reasons why Data Breaches Happen
Unpatched vulns, human errors, malware… All covered in here! Continue reading Top 5 Reasons why Data Breaches Happen
TalkTalk (2015 Data Breach)
My views about the amazing Talk-Talk data breach of 2015 Continue reading TalkTalk (2015 Data Breach)