Top 7 Reasons for using A Multi-Tier Storage Solution

Lower storage spend Organizations are keeping as much as 40% of their inactive data on their most expensive infrastructure. With unstructured video growing exponentially, fueled by the rise of new video surveillance programs, one can’t afford to have this kind of inefficiency. The solution is to adopt a multi-tier storage system that automatically migrates the video to the most cost efficient tiers of storage. Whether that’s high-performance disk storage, object-based storage or high-capacity primary storage, file-based tape or the cloud – the organization can cost-effectively store data based on various…

Read More

Corruption Perceptions Index 2017 By Transparency International

An index recently released by Transparency International, which marks its 25th anniversary this year, reveals some disturbing information. Despite attempts to combat corruption around the world, the majority of countries are moving too slowly in their efforts. While stemming the tide against corruption takes time, in the last six years many countries have still made little to no progress. Even more alarming, further analysis of the index results indicates that countries with the lowest protections for press and nongovernmental organisations (NGOs) also tend to have the worst rates of corruption.…

Read More

Be Cautious: You could be Giving out your Own Passwords

There are two types of hacking or unauthorized access to accounts. The first involves password cracking tools, but most organizations have cyber security features in place to prevent these attacks. However, it’s the second type of attack that can cripple any organization or person’s accounts and databases, and that is a social engineering attack. 〈  “ Social engineers are criminals who take advantage of human behaviour to pull off an online scam or hacking attack. Successful social engineers are confident and in complete control of the situation “ 〉 Social engineers generally…

Read More

INTERPOL Digital Security Challenge

Do you know how to protect your webcam from being hacked? Would you know if a cybercriminal was using your printer to carry out cyberattacks? While most of us are aware of the dangers that cybercriminals can pose to our computers and mobile phones and take steps to protect them, we seldom consider how these threats can affect the growing number of Internet vc connected devices we use in our daily lives. The ‘Internet of Things’ All devices which can connect to the Internet – collectively called the ‘Internet of…

Read More

Security Considerations for Code Signing

Recent security-related incidents indicate the need for a secure software supply chain to protect software products (also referred to as code) during the development, build, distribution, and maintenance phases. Of particular concern is provisioning and updating software that plays a critical role in platform security. A wide range of software products including firmware, operating systems, mobile applications, and application container images must be distributed and updated in a secure and automatic way to prevent forgery and tampering. An effective and common method of protecting software is to apply a digital…

Read More

Traditional Switch Port Security

With Cybersecurity becoming an increasingly important factor in designing modern Ethernet networks, ComNet have launched an industry first edge security feature that is both simple, secure and easy to configure and use. The ComNet exclusive Port Guardian feature has the capability to physically disable a port if unauthorized access is detected. The value in Port Guardian comes in situations where network intrusion is attempted by disconnecting an IP addressable device at the edge to connect to the network. When Port Guardian senses this disconnect, an SNMP notification is sent to…

Read More

Synology Strengthening NAS Portfolio in India

Synology® the global leading provider of network attached storage (NAS), IP surveillance and network equipment solutions, forays into India market with the rollout of its cutting-edge series of NAS solutions in the country. With a proven history of transforming the way users manage data, perform surveillance, and manage the network in the cloud age, Synology has set new benchmarks in the enterprise IT space, leveraging latest technologies and unprecedented innovation coupled with an exceptional customer service. The company has announced strategic partnerships with both online as well as offline channels…

Read More

Banker’s Legal Guide to Deal with Phishing Scams and Cyber Crimes in India

Online banking has revolutionized banking transactions whereby money could be transferred at a single click. It has been a time saver and has been an extremely convenient method to undertake commercial transactions. However, it has led to litigations against banks as well, as with online banking also come phishing emails. Phishing emails in these cases are those which purport to have been sent by the bank with the look and feel of a legitimate email. They ask the user to enter their username and password to reconfirm their accounts, with…

Read More