/home/leansigm/public_html/components/com_easyblog/services

SigmaWay Blog

SigmaWay Blog tries to aggregate original and third party content for the site users. It caters to articles on Process Improvement, Lean Six Sigma, Analytics, Market Intelligence, Training ,IT Services and industries which SigmaWay caters to

Securing cloud computing

What is cloud computing?? It refers to a broad set of policies, technologies and controls deployed to protect data, application and associated infrastructure. Its sub-domain is computer security, network security and information security. Working on a cloud or not is a basic question asked to every employee. For instance, people working in hospitals are generally blamed for disclosing health records of their patients. Talking to a layman, it is a group in an organization connected through networks, but even if the hackers are good at hacking, the data will remain safe within the company boundaries. Therefore, cloud computing is very wonderful stuff to work upon, but only in a secured way. To know more please read the following article by Dennis Stevenson (author): http://it.toolbox.com/blogs/original-thinking/cloud-computing-must-be-securre-75892

Rate this blog entry:
2594 Hits
0 Comments

Why Information Security Is Important For An Organization

Nowadays, organizations are concerned about information security. But, what is information security? Some define it as policies and compliance. Others say it keeps the network and sensitive assets in check. And many say that it’s a barrier. Most organizations fail to implement information security as they don’t understand the subject and does not question conventional thoughts about the subject, and listen to every piece of advice that vendors, auditors, and other outsiders throw at them. Read more at: http://it.toolbox.com/blogs/itmanagement/the-essence-of-information-security-and-why-many-people-often-miss-the-boat-74330

 

 

Rate this blog entry:
3563 Hits
0 Comments

VoIP Security Threats

It was found that throughout the U.S. there has been a 23% increase in information security incidents. It was also found that voice over IP (VoIP) phone services are vulnerable to internet-based threats. It has become important for organizations to understand the current threat landscape to reduce risk of attacks in 2016. Read more at: http://it.toolbox.com/blogs/voip-news/are-you-prepared-for-the-5-types-of-voip-security-threats-70823

 

Rate this blog entry:
4352 Hits
0 Comments

VoIP security threat landscape

VoIP has several benefits, but, companies must consider information security in the planning stages of a VoIP implementation. Security must be the key consideration for VoIP and traditional phone system users in 2016 and beyond. In this article, we will review the VoIP security threat landscape. Read more at: http://it.toolbox.com/blogs/voip-news/phreaking-hackers-protecting-your-voip-from-cyber-crime-70743

 

 

Rate this blog entry:
4137 Hits
0 Comments

All about VoIP security

Every organization is concerned about information security. Despite efforts to invest in better protection, cybercrime is on the rise. No one is spared from such risks. There’s an increased attention on perceived security risks with the VoIP method of telephony. Whether a company is on a traditional phone network or a VoIP environment, voice calls can present a security risk. The risks associated with VoIP implementations can include: call hijacking, call tempering, and reroute calls to insert malware. Read more at: http://it.toolbox.com/blogs/voip-news/how-concerned-should-you-really-be-about-voip-security-a-hypefree-analysis-70102

 

 

Rate this blog entry:
4451 Hits
0 Comments

Protection of information : A Study

Back in the 20's, technology used to be simple. Core functions of the system were not affected by the records management. Every organization has started getting connected to the internet in order to make the lives easier of their workers as well customers. Everyone wants to get access to basic information over the internet as it is an opportunity to learn more about everything which relates to good or bad performance. Even from the customer's side, access to internet helps business with floods of data which leads them to focused marketing. Such information is also spread to the hackers. Hackers then use such individual information to get through government entities or set up robbery attacks. As keepers of the information, companies should hence protect the data and make sure trust is not violated. The exposed information is generally customer information. Determined hackers cannot be stopped from entering into the system. Identities are stolen and more valuable information is lost other than just credit card numbers. Data should be protected by the organization as if it was their own personal information. Apps are a disaster these days as they are gateways to information which directly reach the hackers since consumers unknowingly take such things for granted and provide all their details. Security and privacy experts should be hired and organizations should be very careful with customer information. Read more at: http://www.cmswire.com/information-management/protect-information-as-if-it-was-your-own/?pageNum=2

 

 

Rate this blog entry:
3927 Hits
0 Comments

Manage Information Security at Digital Workplace

Digital workplace is the new norm today. We don’t do our work at one place today or on only one device. We carry our work with us as we move by transferring it to the device that’s most accessible. Smartphones, laptops, desktops, tablets etc. are some of the devices where ore work is saved. This is called Enterprise Mobility. But, with the increase in enterprise mobility, security has again become a big problem.

Dionisio Zumerle, Research Director, Gartner, has pointed out three key factors that need to be addressed to bridge the gap between enterprise mobility and effective security for business information. They are:

  • People
  • Process
  • Technology

Thus, efforts need to be focused on developing information security models applicable for this multiple device systems while keeping in mind the above stated factors.

To know more, please read the following article at Forbes:

http://www.forbes.com/sites/gartnergroup/2015/06/10/mobile-security-challenges-in-the-age-of-digital-business/

Rate this blog entry:
5033 Hits
0 Comments
Sign up for our newsletter

Follow us