Tag Archives: Network Security

Guidelines for Publishing Information Online

Why is it important to remember that the Internet public? Because the Internet is so accessible and contains a wealth of information, it has become a popular resource for communicating, for researching topics, and for finding information about people. It … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, isecurity, Risk Management Strategies, Software Security Risks, Technology | Tagged , , , , , , , , , , , , | Leave a comment

Good Security Habits

How can you minimize the access other people have to your information? You may be able to easily identify people who could, legitimately or not, gain physical access to your computer—family members, roommates, co-workers, members of a cleaning crew, and … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, Software Security Risks, Uncategorized | Tagged , , , , , , , , | Leave a comment

Securing Your Home Network

How are routers used in your home network? Home routers have become an integral part of our global communications footprint as use of the Internet has grown to include home-based businesses, telework, schoolwork, social networking, entertainment, and personal financial management. … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, isecurity, Software Security Risks, Uncategorized | Tagged , , , , , | Leave a comment

Understanding ISPs

What is an ISP? An ISP, or internet service provider, is a company that provides its customers access to the internet and other web services. In addition to maintaining a direct line to the internet, the company usually maintains web … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, isecurity, Uncategorized | Tagged , , , , , | Leave a comment

Understanding Your Computer: Email Clients

How do email clients work? Every email address has two basic parts: the user name and the domain name. When you are sending email to someone else, your domain’s server has to communicate with your recipient’s domain server. For example, … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, isecurity, Uncategorized | Tagged , , , , | Leave a comment

G:7-Security Launches Cyber Security iPhone App

Latest update: G7 Security’s Cyber Tools module successfully completed it’s beta phase and is now live after the release candidate 2 finalized earlier this week. Continue reading

Posted in Computer Security, Cyber Security, Information Security, Network Security, Technology | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a comment

Hacker breaches state computer network

06:02 PM PDT on Saturday, April 11, 2009 From AP SALEM, Ore. — State officials say state computer security experts are investigating a security breach that was detected in an Oregon Department of Human Services computer network. Lonn Hoklin, spokesman … Continue reading

Posted in Computer Security, Network Security | Tagged , , | Leave a comment