Posts

Showing posts from August, 2021

What is Cloud Security? ( ghansham amrani )

Cloud security Defined From authenticating access to filtering traffic, what can configure cloud security to the business's exact needs? Cloud security, also known as cloud computing security, consists of policies, controls, procedures and technologies that work together to protect cloud-based systems, data, and infrastructure. These security measures are configured to protect cloud data, support regulatory compliance, protect customers' privacy, and set authentication rules for individual users and devices. And because these rules can be configured and managed in one place, administration overheads are reduced, and IT teams are empowered to focus on other business areas. How cloud security is delivered will depend on the individual cloud provider or the cloud security solutions in place. However, the implementation of cloud security processes should be a joint responsibility between the business owner and the solution provider. Why is cloud security important? Robust cloud sec...

Phishing Attack ( Cyber Security )

Image
  What is a phishing attack Phishing is a type of  social engineering attack  often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message. The recipient is then tricked into clicking a  malicious  link, which can lead to the installation of malware, the freezing of the system as part of a  ransomware attack  or the revealing of  sensitive information . An attack can have devastating results. For individuals, this includes unauthorized purchases, the stealing of funds, or identify theft. Moreover, phishing is often used to gain a foothold in corporate or governmental networks as a part of a larger attack, such as an  advanced persistent threat  (APT) event. In this latter scenario, employees are compromised in order to bypass security perimeters, distribute malware inside a clos...