Cloud, Data Analysis, Cybersecurity

Skip to content
Menu
  • Home
  • Explore
  • Cloud
  • Splunk
  • Consultancy
  • Contact Us

Category: Information Security

Importance of Metrics in an IT Security Program

by Sumesh MSPosted onNovember 23, 2019November 23, 2019

Importance of metrics in an IT security program IT security metrics are widely used as the primary tools for decision making and evaluating accountability in…

Read More

Critical Log Review Checklist for Security Incidents

by Sumesh MSPosted onJune 13, 2018June 13, 2018

This is a checklist for reviewing critical logs when responding to a security incident. It can also be used for routine log review. General Approach…

Read More

Safety Tips for Parents: Cyberbullying

by Sumesh MSPosted onJune 10, 2018

Safety Tips for Parents: Cyberbullying Cyberbullying is any form of bullying which takes place over digital devices like cell phones, computers, and tablets and it…

Read More

Cyber Safety Tips for Parents

by Sumesh MSPosted onMay 30, 2018May 30, 2018

1. Start Early and Keep Talking: Many kids are given their first tablet or Internet-connected device before they can fully comprehend the power in their…

Read More

Service Level Agreements – Things to Remember

by Sumesh MSPosted onMay 27, 2018May 27, 2018

Every service contracts with a managed service provider (MSP) should be regulated by an SLA (Service Level Agreement). Without a properly drafted SLA it is…

Read More

Mobile Device Security 

by Upen PatelPosted onMay 20, 2018May 20, 2018

Mobile Device Security  Organizational Concern – pose a risk in data security when device used and transported outside physical boundaries Expose of sensitive and proprietary…

Read More

10 Things to know about Data Privacy

by Upen PatelPosted onMay 12, 2018May 12, 2018

10 Things to know about Data Privacy Report compromised data: It is the law Customer loyalty is directly dependent on privacy IT pros bear most…

Read More

SSH Security Risks

by Sumesh MSPosted onMay 10, 2018May 10, 2018

SSH is a widely used protocol for secure remote access and file transfers over untrusted networks. A Secure Shell (SSH) tunnel consists of an encrypted…

Read More

Data Protection

by Upen PatelPosted onMay 9, 2018May 9, 2018

Some of the basic question you should ask about data protection How information is governed at your business? Do you classify your data, identifying sensitive…

Read More

Posts pagination

Previous Page Page 1 Page 2 Page 3 Next Page
  • Contact us
  • Team
  • Privacy Policy

2023 | www.cloudcybersafe.com

Cambium Theme by BestBlogThemes ⋅ Powered by WordPress