Posts

Showing posts from November, 2020

What does the information security professional do?

 Information security is the area of ​​information technology that has the mission of protecting all information and data circulating on the network. Security is essential so that personal bank account data and even sensitive information from governments and companies, for example, are not targeted by hackers. According to the technical norm of ABNT (Brazilian Association of Technical Norms) that establishes the general guidelines and principles of information security management, information security is the “protection of information from various types of threats to ensure continuity business, minimize business risk, maximize return on investments and business opportunities ”. The professional responsible for this area is the information security specialist. It must guarantee the availability of information resources, preserve the integrity of the information and preserve the confidentiality of the data.  Based on the pillars of confidentiality, integrity, availability and authenticit

How to extend the life of a computer?

 At startup, the device experiences an increased load (frequent on-off operations for the hard disk are especially dangerous). It is also important that during boot there is a sharp temperature drop, which negatively affects the state of the computer. It is advisable to turn it off no more than once a day. Prevent your computer from overheating The device should not heat up excessively. The hard drive is especially sensitive to high temperatures. It wears out faster if the cooling system does not cope with its task. To avoid overheating your computer: - periodically clean it from dust; - watch the voltage (it should not be too high). If the computer starts to get very hot during operation, check if the cooling system is working properly. The case fan may need to be replaced. Sometimes the problem is processor wear, but fixing it yourself is difficult. It is worth contacting the workshop. Handle your device with care The computer is sensitive to shock and vibration. Try to avoid mechani

How can companies protect themselves from cyber attacks?

The authors of the study advise paying attention to the network literacy of employees, introducing periodic password changes and their increased complexity requirements, as well as regularly updating the software and installing reliable encryption of all local resources. Cybersecurity steps companies need to take (Photo: The Myers-Briggs Company) But the main conclusion is that employees need to be tested according to the MBTI method and each person should be given personal instructions based on their personality type. Example Cybersecurity Instruction for Type INTP (Photo: The Myers-Briggs Company) This will help to achieve maximum response even from those who know nothing about phishing and cyber fraudsters. The study showed that there is no significant relationship between compliance with cybersecurity measures and the group characteristics of the respondents, such as country, gender, age or industry. The Computer Network Support Specialists are the trained experts and are extremel

Algorithm for troubleshooting computer problems

If you encounter problems with your computer and its hardware, you must act correctly. If the problem is with the hardware, for example, the printer does not print, you should start looking for the problem from that device. First, you need to check the printer's electrical and computer connections. Perhaps this step will fix the problem. Secondly, you need to make sure that the printer is displayed and ready to use in the Device Manager on your computer. This indicates that the device is correctly installed and configured, connected to the mains. Thirdly, you need to check if the paper is jammed in the printer and if there is toner in the cartridge. If there are problems with connecting the device, paper jams or the toner in the cartridge has run out, then such problems are solved by quickly eliminating the cause of the malfunction (correcting the cable, removing the jammed paper, refilling the cartridge). If the problem is in the "Device Manager" , the computer does not

Microsoft disables 90% of computer network used by Russian hacker group

 Aided by a series of U.S. court orders and relations with technology providers in other countries, Microsoft said its week-long campaign against the group that runs the Trickbot network will avoid a possible source of interference in the November 3 election. . "We have destroyed a large part of its infrastructure," said Microsoft corporate vice president Tom Burt in an interview. "The group's ability to infect targets has been significantly reduced." The hackers responsible for Trickbot infected more than 1 million personal computers, including many within local governments, according to cybersecurity professionals. They then make deals with other groups to install ransomware and other programs on infected machines, security professionals say. Although there is no evidence that the group has worked with foreign governments, Burt said that Microsoft aimed to reduce the capacity of Trickbot before the election, should Russian spy agencies try to use it to interfe