Information Security

October 8, 2015

Facial Recognition – How This Technology will be Used in Verifying Online Transactions

Facial Recognition – How This Technology will be Used in Verifying Online Transactions The contribution of internet connectivity towards e-commerce cannot be underestimated. Today, if you want to purchase […]
August 21, 2015

Use of Security Products and Systems in ICT

Use of Security Products and Systems in ICT ICT is the technology that facilitates access to information through the use of telecommunications with focus, primarily, on […]
June 20, 2015

Keeping Confidential Business Information Secure

Keeping Confidential Business Information Secure In every business entity, there is some information that is considered to be of sensitive nature. This includes employee and customer […]
April 25, 2015

Security Tips and Hints for your Smart Phone

Security Tips and Hints for your Smart Phone Know your phone details Know and record somewhere the unique identification number (IMEI) of your phone by dialing […]
February 12, 2015

Two-factor Authentication (2FA)

Security Tips in Companies – Protecting information through the use of two-factor authentication (2FA) The implementation and use of two-factor authentication (2FA) is a good measure to consider. […]