Sunday, April 28, 2019

Vacation and Cyber Security

Summer vacations and travel plans are ON. Unfortunately, travel can open you up to many new vulnerability . It is important to strive to be as secure as possible with your digital devices and information, while on the move.. By following some smart practices, your family can connect with greater confidence during a summer escape.
Keep a clean machine: make sure all security and critical software is up-to-date on your mobile devices ,
Lock down your login: Your usernames / passwords are not enough to protect key accounts like those you use for email, banking, and social media. Fortify by multi-factor authentication.
Password protect: Use passcode or security feature likea finger swipe pattern or fingerprint  to lock your mobile device.
Think before you use that app: New apps are tempting! It is important to always download new apps from only trusted sources . Additionally, consider limiting your apps access to services on your device, like location services.
Own your online presence: Set the privacy and security settings on social media accounts, web services, and devices. It is okay to limit how and with whom you share information – especially when you are away.
Get savvy about what you do on other peoples’ Wi-Fi and systems: Do not transmit personal info or make purchases on unsecure or public networks. Instead, use your phone carrier internet service for these needs. For laptops/tablets, it is easy to use your phone as a personal hotspot to surf more securely using carrier data. Also, never use a public computer or device to shop, log in to accounts, or do anything personal. 
Turn off Wi-Fi and Bluetooth when idle: When Wi-Fi and Bluetooth are on, they may connect and track your whereabouts. Only enable Wi-Fi and Bluetooth when required, and disable your Wi-Fi auto-connect features.
Protect your Money: Be sure to shop or bank only on secure sites. Web addresses with ‘https://’ and a lock icon indicate that the website takes extra security measures.
Share with care: Think twice before posting pictures that signal you are out of town. Knowing you are away from home is a great piece of information for a criminal to have and they may target your home for physical crime.
 Keep an eye on your devices: Laptops, smartphones, and tablets are all portable and convenient, making them perfect for a thief to carry away! Keep your devices close to you and hold onto them if strangers approach you to talk. 

Saturday, December 23, 2017

Is your Password Safe




Millons of the passwords are hacked in several security breaches. The password you are currently using - Is it secure and is not available in hacker's directory of passwords.

 Click below a magic link to check :

https://haveibeenpwned.com/Passwords

Sunday, December 17, 2017

Test your security

Security Planner provides research-based recommendations that are beneficial for a general population of users, most of the time. It is not a security manual for those facing targeted physical and digital threats who need additional support and more specialized advice. Moreover, if you are aware of a targeted effort to compromise your security, or if your security has already been compromised, you should seek additional help.

SECURITYPLANNER.ORG

Saturday, March 24, 2012

Segregation of Duties under ERP

Segregation of Duties (SoD) separates roles and responsibilities to ensure that an individual cannot process a transaction from initiation through to reporting without the involvement of others and thereby SoD reduces the risk of fraud or error to an acceptable level.For example, no one individual should be able to set up a new supplier, raise a purchase order for that supplier, post and approve the invoice from that supplier, create, approve and record the payment to that supplier. This is because giving a single individual the ability to perform all of the above operations increases the risk of fraud or error. this is a key part of achieving SOX/MiFID/ISO2100 compliance.

Download SOD GUIDE

Saturday, December 25, 2010

ORACLE FLASHBACK

Oracle flashback is a powerful way to access past or sometimes lost data. Please check these new tools --> Click

Oracl connectivity to Access/SQL server etc securedly

Heterogeneous Services

Oracle9i, like previous versions, supports heterogeneous services to allow data in non-Oracle database to be queried using SQL. This support has been in the form of transparent gateways, which are vendor specific, or generic connectivity which uses ODBC or OLEDB to make the connections.

The functionality supported by generic connectivity is typically more limited than that possible when using vendor specific gateways, but it is quick and simple to configure.
The steps listed below can be used to connect Oracle to any ODBC compliant database (MS Access, SQL Server etc.) on the local server: Click for More

Thursday, December 9, 2010

E-Procurement

E-Procurement process in addition to regular web security requires authentication, authorisation, confidentiality and non-repudiation. Also there can be conflicts on timings as the uploading of the documents is banned after bid-submission time. The imporant e-Procurement related security issues are summarised in the presentation --> CLICK

Vacation and Cyber Security

Summer vacations and travel plans are ON. Unfortunately, travel can open you up to many new vulnerability . It is important to strive to be ...