Configuring Cisco ASA 5506-X Firewall for Internet Connection

Firewalls represent a crucial point of control of ingress and egress of network traffic to organizations' resources, and configuring one correctly could protect your resources against attacks from the wider internet.


Post a Comment

Microsoft Azure Cloud - Data Center

                 Microsoft Azure – Module Introduction
Microsoft Azure Data Center Architecture helps with part of objective 1.1, describing how Azure uses Global Foundation Services (GFS) data centers which is part of the design of Microsoft’s Infrastructure and Networking domain.


Post a Comment

Backup System Files Securely in Cloud using Sia Advanced Encryption Blockchain

The idea for a distributed blockchain storage system was originally conceived by David Vorick in the summer of 2013. A discussion with Luke Champine over email, resulted in the “Nimbus network” formally released by David at the HackMIT hackathon in September, with a presentation outlining the idea which was now called ‘Bytecoin”.


Post a Comment

How Monaco Crypto is Changing Payment Systems with Blockchain

Monaco is a payment and cryptocurrency platform that operates its own native currency known as MCO token. The project has raised $26.7 million since its launch on the 18th May 2017.

1 Comment:

Post a Comment

5 Real-World Blockchain Crypto Projects to Track in 2019 and Beyond

Unless you’ve been living under a rock for the past year, it’s almost impossible to go a single day without hearing or reading about activities in the crypto-space since the rise and fall of the disruptive crypto-currency Bitcoin.


Post a Comment

Microsoft Azure Cloud Development – An Overview

Microsoft Azure, codenamed “Project Red Dog” and formerly Windows Azure is a cloud computing service created by Microsoft on February 1, 2010 for building, testing, deploying, and managing applications and services through Microsoft-managed data centres.


Post a Comment

Implementing Group Policy in Windows Server 2016

Group Policy, a feature found in Microsoft Windows NT family of operating systems is deployed to control the working environment of user accounts and computer accounts. This feature provides centralized management and configuration of operating systems, applications and user settings on Active Directory environments. 


Post a Comment

Python Programming for Beginners- Visual Studio Code Integration

Python is described as a high level programming language, operating some distance away from machine code structures. The syntax is easy to understand and use, making it a great first language to learn with very extensive integration capabilities and its ability to work across any framework such as web, games, executables and even data analytics, data visualization and robotics.

1 Comment:

Post a Comment

Email Security 101: 5 Simple Tricks to Ensure Privacy

Email is one of the most trusted ways of communication yet it’s not 100 percent safe. Over the years, we’ve seen many forms of email attacks ranging from impersonation to phishing and everything in between. As a matter of fact, email phishing is the number one vehicle for ransomware and malware attacks. Estimates show that more than 90 percent of all malware is delivered through email.

This gives you an idea of just how important email security is in the modern age. So, what can you do to improve your email security? There are steps you can take to ensure privacy. However, we should never be complacent. Hackers are getting more sophisticated by the day. Here are 5 email security tips and tricks to ensure privacy when using email. 

PGP Encryption 
Consider using Pretty Good Privacy (PGP), also called GNU Privacy Guard (GPG), to protect the content from being read by others. Encrypt everything, including your cached or archived messages, the actual email messages, and the email provider. PGP encryption ensures that the messages are only accessed by the intended recipients. Even the most skilled hackers will have an extremely difficult time trying to access your emails. 

PGP encrypts your emails to keep them safe from interception, ensuring that nobody snoops on your business. Some of the information – the metadata – is still left in the open. Metadata contains information such as the recipient, size of the email, the sender’s email address, and time the email was sent. This is unavoidable, but most encryption tools ensure that metadata cannot be linked to the conversations themselves hence rendering it useless for hackers.

Activate Transport Layer Security (TLS)
Set up Transport Layer Security (TLS) to secure the connection from your email provider. TLS is a form of encryption that adds security to your email. Enabling TLS is also a good way to verify the integrity of the server facilitating your connection.

When used for sending emails, Transport Layer Security (TLS) results in your messages getting sent securely between your device and your SMTP service. Activating TLS is a straightforward process, simply navigate the settings menu and you will find an option that enables TLS. 

Don’t Open Attachments Without Scanning
Often, we receive emails that contain attachments. That’s usually not a problem when dealing with colleagues, friends, or family. However, you’ll receive a phishing email once in a while. In most cases, these emails come from unknown sources and contain files for you to open.

Phishing emails contain all kinds of malware, so do not open without scanning. Better still, only open files that you are expecting and from senders you trust.

Be Careful with Images Sent Via Email
A lot of newsletter providers and malicious sites often use images to track users. The images contain a tracking code which reveals the identity of the recipient to the mailing list administrator. It's easy for them to do that because when you click on the email, the image loads automatically from a remote server.

You can disable the tracking code by configuring your email reader not to load external images by default. As a rule of thumb, never click on links from unknown senders in your inbox. 

Use a Strong Password
Having a strong password is one of the best ways to secure your email from hackers. Your password should be unique in the sense that no one else on the service has a similar password. Use a combination of small and capital letters, numbers, and special characters to create a strong password for your email account.

You can come up with your own combination if you’re feeling creative, otherwise, there’s an abundance of password generation tools online to help you do the job.

A strong password alone is not enough, you need to layer security protections. Introducing two-factor authentication. A two-step authentication connects your email account to your cell phone. It creates a one-time password, sent to the registered mobile number, every time someone tries to log in to your email account. Two-tier authentication reduces the reliance on passwords for email security. Even with your password, hackers will not be able to access your email account.

Here are 5 easy tips to lockdown your digital fortress. If your email account is even remotely important to maintaining your personal relationship and professional image, don’t leave your door wide open. Capitalize on the free tools online to keep strangers away.

                                                                     This has been a Guest Post by our partners    

1 Comment:

Post a Comment