Category Archives: Technology

Guidelines for Publishing Information Online

Why is it important to remember that the Internet public? Because the Internet is so accessible and contains a wealth of information, it has become a popular resource for communicating, for researching topics, and for finding information about people. It … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, isecurity, Risk Management Strategies, Software Security Risks, Technology | Tagged , , , , , , , , , , , , | Leave a comment

Risks of File-Sharing Technology

What is file sharing? File sharing involves using technology that allows internet users to share files that are housed on their individual computers. Peer-to-peer (P2P) applications, such as those used to share music files, are some of the most common … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, isecurity, Network Security, Risk Management Strategies, Software Security Risks, Technology | Tagged , , , , , , , | Leave a comment

Understanding Bluetooth Technology

What is Bluetooth? Bluetooth is a technology that allows devices to communicate with each other without cables or wires. It is an electronics “standard,” which means that manufacturers that want to include this feature have to incorporate specific requirements into … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, Software Security Risks, Technology | Tagged , , , , | Leave a comment

Shopping Safely Online

Why do online shoppers have to take special precautions? The Internet offers convenience not available from other shopping outlets. From the comfort of your home, you can search for items from multiple vendors, compare prices with a few mouse clicks, … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, Software Security Risks, Technology | Tagged , , , , , | Leave a comment

Google vs. Microsoft vs. Apple: Software Security Risks – Year-End 2011

by Abbas Mirza Dec 26, 2011 2:30 am Google, Microsoft and Apple are constantly engaged in a struggle for industry dominance, competing in software as well as hardware ranging from computers, smart phones and multimedia devices. Meanwhile, the three companies … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Hacked, Information Security, Network Security, Risk Management Strategies, Software Security Risks, Technology | Tagged , , , , , , , , , , , , , , , , , | 2 Comments

G:7-Security Launches Cyber Security iPhone App

Latest update: G7 Security’s Cyber Tools module successfully completed it’s beta phase and is now live after the release candidate 2 finalized earlier this week. Continue reading

Posted in Computer Security, Cyber Security, Information Security, Network Security, Technology | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a comment

Cyber Security Challenge Launched

In an attempt to find the next generation of cyber security professionals, and because there are not enough cyber security professionals to go around!, the UK Government has launched the Cyber Security Challenge. With online and face-to-face competitions, the challenge … Continue reading

Posted in Computer Security, Cyber Security, Information Security, Technology | Tagged , , , , | 3 Comments