Category Archives: Network Security

Understanding Your Computer: Operating Systems

What is an operating system? An operating system (OS) is the main program on a computer. It performs a variety of functions, including determining what types of software you can install coordinating the applications running on the computer at any … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, isecurity, Network Security | Tagged , , , , | Leave a comment

Risks of File-Sharing Technology

What is file sharing? File sharing involves using technology that allows internet users to share files that are housed on their individual computers. Peer-to-peer (P2P) applications, such as those used to share music files, are some of the most common … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, isecurity, Network Security, Risk Management Strategies, Software Security Risks, Technology | Tagged , , , , , , , | Leave a comment

Understanding Voice over Internet Protocol (VoIP)

What is voice over Internet protocol (VoIP)? Voice over Internet protocol (VoIP), also known as IP telephony, allows you to use your Internet connection to make telephone calls. Instead of relying on an analog line like traditional telephones, VoIP uses … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, isecurity, Network Security, Software Security Risks | Tagged , , , , , , | Leave a comment

Browsing Safely: Understanding Active Content and Cookies

What is active content? To increase functionality or add design embellishments, web sites often rely on scripts that execute programs within the web browser. This active content can be used to create “splash pages” or options like drop-down menus. Unfortunately, … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, Network Security, Software Security Risks | Tagged , , , , , , , | Leave a comment

Securing Wireless Networks

How do wireless networks work? As the name suggests, wireless networks, sometimes called WiFi, allow you to connect to the internet without relying on wires. If your home, office, airport, or even local coffee shop has a wireless connection, you … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, Network Security, Software Security Risks, Uncategorized | Tagged , , , , , | Leave a comment

Choosing and Protecting Passwords

Why do you need a password? Think about the number of personal identification numbers (PINs), passwords, or passphrases you use every day: getting money from the ATM or using your debit card in a store, logging on to your computer … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Hacked, Information Security, isecurity, Network Security, Software Security Risks, Uncategorized | Tagged , , , , , , , | Leave a comment

Using Caution with Email Attachments

Why can email attachments be dangerous? Some of the characteristics that make email attachments convenient and popular are also the ones that make them a common tool for attackers: Email is easily circulated – Forwarding email is so simple that … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, isecurity, Network Security, Software Security Risks, Uncategorized | Tagged , , , , , | Leave a comment