Two-factor Authentication (2FA)

February 12, 2015
tsol

Security Tips in Companies – Protecting information through the use of two-factor authentication (2FA) The implementation and use of two-factor authentication (2FA) is a good measure to consider. This practice requires users to login to their accounts using not just a username and…

Read More

Facial Recognition – How This Technology will be Used in Verifying Online Transactions

October 8, 2015
tsol

Facial Recognition – How This Technology will be Used in Verifying Online Transactions The contribution of internet connectivity towards e-commerce cannot be underestimated. Today, if you want to purchase something online, all you need is entering your credit card details and password. However, as technology…

Read More

Use of Security Products and Systems in ICT

August 21, 2015
tsol

Use of Security Products and Systems in ICT ICT is the technology that facilitates access to information through the use of telecommunications with focus, primarily, on communication technologies. ICT is a blend of Internet, Ethernet and wireless networks, cell phones,…

Read More

Keeping Confidential Business Information Secure

June 20, 2015
tsol

Keeping Confidential Business Information Secure In every business entity, there is some information that is considered to be of sensitive nature. This includes employee and customer data. To keep such information safe, the following simple steps will come in handy:…

Read More

Security Tips and Hints for your Smart Phone

April 25, 2015
tsol

Security Tips and Hints for your Smart Phone Know your phone details Know and record somewhere the unique identification number (IMEI) of your phone by dialing *#06#. This information will help your service provider to block your phone if stolen….

Read More

Preventing Identity Theft while Travelling

January 5, 2015
tsol

While making domestic or international travels, there are certain security measures you should undertake. These measures apply equally to all trips whether long or short. The objective is to ensure that your personal information remains safe. It also prevents the…

Read More