About 27 results
-
Back to basics: Defending against phishing attacks
Alfonso Barreiro notes that phishing attempts are still duping unwary targets. Here are some tips to share with your users to help protect your organization from compromise.
-
Preparing for the DNSChanger Internet outage
Alfonso Barreiro tells all you need to know to clean up the DNSChanger malware that has affected millions of users. Make sure your organization is prepared for the July 9, 2012 dea...
-
Defending against Advanced Persistent Threats
Alfonso Barreiro defines the security class known as Advanced Persistent Threats (APTs) and describes the security view you should take of your organization to combat them.
-
Attacked by Anonymous: How to defend against a denial-of-service
Alfonso Barreiro witnessed an Anonymous-led attack firsthand. Here is a description of their primary weapons and the countermeasures that can be taken against them.
-
Be careful not to incur security debt
Alfonso Barreiro explains the concept of security debt and how you can use this metaphor to raise awareness about security problems that might exist in your own organization.
-
How to sell information security to management
Alfonso Barreiro shares his tips for selling security initiatives to management -- as well as a few methods you should avoid.
-
Six information security lessons from 2011
Alfonso Barreiro lists the most important security lessons from 2011 that the security-conscious should heed in order to plan accordingly for 2012.
-
Controlling your network using Network Access Control
Alfonso Barreiro looks at the various methods of implementing network access control (NAC) in order to keep unauthorized and non-compliant devices off your network.
-
Implementing multi-factor authentication: What to consider
Alfonso Barreiro points out the main issues you'll have to consider when implementing multi-factor authentication. These solutions can strengthen security, but only if you design t...
-
Authenticating users: Going beyond the password
Alfonso Barreiro describes the most common authentication factors in use today and lists their strengths and weaknesses. What is the next step in authentication strategies?