Security

small business data encryption

The Best Tools for Small Business Email Encryption

The world today has shifted and become increasingly digitally based. Between social media platforms like TikTok and Twitter, digital messaging platforms, video conferencing, and more, it seems like we spend

how to secure your personal webcam

How to Secure Your Personal Webcam

It feels universal at this point that everyone has some instinctual fear about a stranger hacking into their personal webcam. While much of this fear has come from media, movies,

enhance your cybersecurity

These 5 Things Will Enhance Your Cybersecurity

In today’s world, you can’t take cybersecurity too seriously and you can’t have policies that are too strict. Cybercrime is constantly rising and is a major concern for everyone, including

SQL Injection Tips, Part 1

SQL injection is probably the most common and easiest hacking technique out there. Now, don’t think I condone it, I’m just trying to make you aware of some of the

Ascertain Whether or Not TLS 1.2 Is Enabled on a Server

You can run a Registry Query from the command prompt to ascertain if TLS 1.2 is enabled on a server or not. reg query “HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSecurityProvidersSCHANNELProtocolsTLS 1.2Client” reg query “HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSecurityProvidersSCHANNELProtocolsTLS 1.2Server”

Using Symbolic Links in Java

Symbolic links are a useful entity, with which you can introduce some kind of encapsulation. The Symbolic link can be created in a secure environment (ex: DMZ) where users can

Find the TLS Version a Vendor Supports

Transport Layer Security (TLS) is a security protocol that allows for secure Internet communication. TLS has various versions and you will need to know whether a particular vendor supports the