Tag Archives: isecurity

Risks of File-Sharing Technology

What is file sharing? File sharing involves using technology that allows internet users to share files that are housed on their individual computers. Peer-to-peer (P2P) applications, such as those used to share music files, are some of the most common … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, isecurity, Network Security, Risk Management Strategies, Software Security Risks, Technology | Tagged , , , , , , , | Leave a comment

Staying Safe on Social Networking Sites

What are social networking sites? Social networking sites, sometimes referred to as “friend-of-a-friend” sites, build upon the concept of traditional social networks where you are connected to new people through people you already know. The purpose of some networking sites … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, isecurity, Uncategorized | Tagged , , , , , , , , , | Leave a comment

G:7-Security Launches Cyber Security iPhone App

Latest update: G7 Security’s Cyber Tools module successfully completed it’s beta phase and is now live after the release candidate 2 finalized earlier this week. Continue reading

Posted in Computer Security, Cyber Security, Information Security, Network Security, Technology | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a comment

Cyber Security Challenge Launched

In an attempt to find the next generation of cyber security professionals, and because there are not enough cyber security professionals to go around!, the UK Government has launched the Cyber Security Challenge. With online and face-to-face competitions, the challenge … Continue reading

Posted in Computer Security, Cyber Security, Information Security, Technology | Tagged , , , , | 3 Comments