Best Practices for Data Security

Most businesses have routine occasion to discard confidential data about their business operations or personal client information acquired through commerce. Data sets and reports such as customer lists, price lists, sales statistics by state or product line, drafts of bids, responses to RFPs, and internal correspondence contain information about business activity which would interest any […]

Data Security Management for SMBs

Data security management continues to be a top business challenge for CIOs, CTOs, and Senior IT professionals in small, medium, and large businesses across all industries. In fact, according to a recent survey by Gartner of more than 2,000 CIOs, data security remains a top ten CIO concern just as it has for the last […]

White House Appoints McAfee CTO to Cybersecurity Post

The Obama administration officially selected a senior executive from McAfee to be the Department of Homeland Security’s top cybersecurity official. Phyllis Schneck, a vice president and CTO for the public sector at McAfee, a unit of Intel, will start in early September as the deputy undersecretary for cybersecurity, a DHS official said. Homeland Security takes a leading […]

Cybercriminals Increasingly Target Small Businesses.

A recent data breach investigations report from Verizon shows that small businesses continue to be the most victimized of all companies. Is this because there are many more smaller businesses than larger ones – and the larger ones have more resources and layered security mechanisms to combat cyber attacks? The answer depends on a couple […]

Build Your Own Security – Free eBook from IT Security Column

paperbackbookstanding - Copy

Good day readers!   Today, I am proud to announce that after 7 months of blogging about IT security on IT Security Column, I had finally come up with my very own eBook where I titled it ‘Build Your Own Security’. Don’t get me wrong that I am going to make money here and leave […]

How Often Should You Scan Your Computer for Malware?

Credit: David Castillo Dominici

There isn’t any security text book or ‘Must Follow’ guide on how often you should get your computer scanned for Malware such as Virus, Trojan, and Worms. It is always good to scan as much as possible to ensure that your are safe from any infection. The situation where you need a scan need to […]

How to Protect Yourself from Broken SSL Encryption by BEAST


‘Browser Exploit Against SSL/TLS’ or also known as BEAST is becoming the hot topic today as this toolkit is able to break web browser’s SSL encryption. We always taught the end users where for you to have a strong security, you should always enable the SSL or the HTTPS connection. BEAST uses the techniques like […]

10 Ways to Get Your Computer Infected With Malware

no firewall

This entry is the last chapter of my URL Investigation and Prevention series and would like end this series with 10 ways on how you can get your computer infected with Malware. Usually a proper guide will be guiding an individual on how to prevent unwanted things. This entry is special because I want to […]

How to Use Kaspersky Virtual Keyboard Against Keylogger


Kaspersky Internet Security 2012 comes with a virtual keyboard where this application helps to fight against basic keylogger. The virtual keyboard was available since the 2009 version and it is still available until today due to the effectiveness of this application. To some of the readers who are new to keylogger, you might be wondering […]

Subscribe, Share and Win a One Month Advertising Package


IT Security Column will run a 10 days contest now where the winner of this contest will win a Free One Month 125×125 (on your right) Advertisement from this blog. To participate in this contest, all you need to do is to subscribe, share and win which I will explain in details on the steps […]