Encryption

Home/Tag: Encryption

8-Steps to Secure Your Computer

2020-09-23T04:09:03+00:00Categories: Computer & Network Concepts, Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , |

8-Step to Secure Your Computer Whether you use your computer primarily for work tasks or personal use or both, it’s highly likely you want to keep it and its contents safe and secure. Keeping your computer secure helps you avoid malware and direct hacking attempts designed to steal your personal information. In this post, we’ll [...]

BitLocker Drive Encryption

2020-09-21T11:10:22+00:00Categories: Network Security|Tags: , , , , , , , , , , , |

BitLocker Drive Encryption is a tool in the Windows operating system for encrypting the entire contents of a drive from a computer hard drive. In this post, we do not intend to discuss the concepts of cryptography. You can read this post to understand these concepts. This tool in Windows 10 is located in the [...]

5 Backup Software (for Home/Personal Computer)

2020-09-13T12:15:34+00:00Categories: Backup|Tags: , , , , , , , , , , , , , , , , , |

In this post, we are going to introduce you to five powerful backup software. All of these applications are suitable for home and personal computers.     Acronis True Image is one of best backup tools. Acronis official website This software has a good desktop interface and working with it is not very complicated. [...]

Familiarity with Anti-malwares (Home solutions) – Part II

2020-09-26T06:49:12+00:00Categories: Anti-malware & Firewalls, Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

In the previous post, we reviewed the products of five manufacturers. We now intend to review the products of five other companies. See also: Familiarity with Anti-malwares (Home solutions) - Part I     ESET is a Slovak internet security company that offers anti-virus and firewall products. ESET is headquartered in Bratislava, Slovakia, and [...]

Familiarity with Anti-malwares (Home solutions) – Part I

2020-09-09T06:38:33+00:00Categories: Anti-malware & Firewalls, Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Another step to secure your personal computer (desktop or laptop) as well as your tablet and mobile phone is to use anti-malware. The anti-malware industry is a relatively old industry, and over the decades many anti-malware manufacturers have become very experienced and powerful. The good news for us end users is that there is very [...]

VPN

2020-09-02T05:35:40+00:00Categories: Computer & Network Concepts|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , |

A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. In other words, A Virtual Private Network is a connection method used to add security and privacy [...]

HIPAA Series – Security Standards: Technical Safeguards

2020-09-09T07:07:08+00:00Categories: Network Compliances, Network Security|Tags: , , , , , , , , , , , , , , , , |

In this post we are going to talk about technical Safeguards. This post is the fourth post in the HIPAA series. This series of posts is called the HIPAA Series. The series will contain seven post: Security 101 for Covered Entities Security Standards: Administrative Safeguards Security Standards: Physical Safeguards Security Standards: technical Safeguards Security Standards- [...]

HIPAA: Medical Security

2020-09-09T07:10:11+00:00Categories: Network Compliances, Network Security|Tags: , , , , , , , , |

HIPAA law was created to ensure that patient’s sensitive information is protected. Protected health information (PHI) must be secured in the form of administrative, physical, and technical safeguards. It's better that before continuing to read this post, first read our previous post about HIPAA. The Health Insurance Portability and Accountability Act (HIPAA) was originally passed by [...]

Go to Top