LETA Company which is the market leader of information security in Russia and the Falcongaze Company Premium Business Partner completed the implementation of SecureTower system designed to protect data from leaking into the corporate network of FSUE General Radio Frequency Centre.
The Federal State Unitary Enterprise General Radio Frequency Center (FSUE GRFC) is a part of the unified system of radio frequency service. This department provides a range of services to ensure the efficient use of the RF spectrum. In particular, the GRFC deals with the examination of the possibility of using appropriate electronic facilities, as well as their electromagnetic compatibility with other tools.[Read More...]
Fraud is a crime in which the criminal deliberately gives someone false information. This is done in the hopes of inducing the person to give him or her money or valuables. In cyber fraud the Internet or a mobile phone is used to accomplish the goal.
There are many variations of cyber fraud. Three of the most common variants use online auctions, classified ads, and what fbi.com calls the Grandparent Scam.[Read More...]
With websites like Facebook, Twitter, and YouTube just a click away on Internet enabled office computer systems, productivity loss and security concerns become major issues for organizations. Of course, there are firewalls as well as rules and policies as to ‘what not to view in office’. However, workers too should learn to be disciplined and must take initiatives to ensure that they prove their worth for employers and do not waste time in unproductive activities. Frank Johnson tells you about ‘what not to view in offices.[Read More...]
Identity theft is one of the most insidious crimes there is. You aren't robbed at gunpoint; you don't come home to find your house broken into. You try to use your check card or credit card, and it doesn’t work. A few phone calls later, you know why. Someone has stolen your personal information. They have drained your checking account and maxed out your credit cards. Your identity has been stolen.[Read More...]
Anywhere money is changing hands, it is likely that thieves and con artists will be trying to get a piece of it. Some of the same scams that have been used for decades have been modified for use on the Internet. Online auctions and classified ads are a common target for cyber thieves. Other people use social media sites to update an old trick called the Grandparent Scam. You don't have to fall victim to these cons. A few simple steps will keep you safe and keep your money in your bank account where it belongs.[Read More...]
With increasing popularity of social networking sites and smartphones for communication, employees tend to get distrcated at work too. But this causes a severe loss of productivity and also amounts to infringement of data protection laws. Frank Johnson describe your legal rights at work and the right ways to use lectronic devces. Employees often check their personal mails or log in to social networking account using the Internet at work. Employers-provided mobiles are used for long talks with their friends and family members ignoring important work at the office.[Read More...]
The Internet – it’s hard to think of life without it. But many parents these days may argue that when it comes to their kids, life with it may be more challenging than living without it. As our lives becomes more connected to the online world, keeping up with the risks it poses to children needs to be a top priority for parents. From concerns of predators to cyberbullies, protecting children from online threats is one of the top safety concerns facing the youth of the 21st century.[Read More...]
Organizations face a constant barrage of cybersecurity threats. Botnets, malware, worms and hacking are just a few things that keep IT managers awake at night, wondering if their network is safe and strong enough to deflect the next attack. Rather than reaching for a sleep aid to get through the night, organizations need a coherent methodology for prioritizing and addressing cybersecurity risks. Here’s one for the taking. Too many organizations either suffer from a “security paralysis,” in which it is impossible to prioritize areas for remediation with their limited resources, or attempt to apply a few “best practices” in the hope that what worked for another organization will work for them.[Read More...]
The VPN or the Virtual Private Network is a service is an option that has gained immense popularity all over the world. The VPN service provider offers an alternative to a dedicated personal network connection for the different corporate offices across the globe. Actually, VPN is a private network built upon the Internet network having public access. It uses the different security means and the encryption followed by the public network. This in turn helps in maintenance of the organizational secrecy and keeps the information private. This is one of the reasons why VPN is also referred as Internet VPN. It can be used effectively to unblock any website such as facebook, youtube, skype etc.[Read More...]
USB flash drives are great because they are really cheap and you can conveniently move data between computers. The only problem is when you store sensitive data on a USB drive and it gets lost or stolen![Read More...]
Computer users are willing to go so far as to give up their most coveted vices to alleviate mounting spam frustrations.Almost a third of survey respondents admitted they would willingly give up their morning coffee in order to be free of spam, while over 40% would sacrifice their afternoon office snack. An additional 18% said they would even give up coveted vices such as happy hour drinks to relieve their inboxes of spam.[Read More...]