Online Security

SQL Injections

Posted on February 23, 2015 at 11:46 am

SQL injections are one of the biggest issues in online security, because it doesn’t matter if you’re being careful with your passwords online or anything like that, as to do this form of online hacking you don’t need to have password information.

So what is SQL injection? SQL injection is a technique where you enter code into a data field, this then causes the website to execute the code, which is typically account details of members of the website. These account details can then be used to defraud the owner of the account, either by taking the password they used for the account and then checking other services to see if the account holder has used the same password for those services, or by taking the credit card/payment details from the account and then buying a load of products with it before they’re discovered.

 

Posted in Online Security

Computer Security

Posted on May 21, 2014 at 3:47 pm

The computer security services industry consists of a wide range of different services, all trying to accomplish the same, but to differing degrees. The level of service you require should line up with the level of security concerns which your business experiences. Having a firewall, anti-spam, and anti-virus program within your business’s security system is essential for all businesses with a computer reliant business, but this is only the basic level of security offered by the computer security industry. While many of these are things we’re already familiar with, they can be taken to higher levels than what is readily available. Higher grade security programs, and higher grade firewalls will definitely add cost, so you should carefully consider how much value you could potentially derive from choosing such an option, and then construct a forecast to determine whether it is worth it. If it is, then you can do one of two things. You can have them programmed bespoke for your needs, or you can choose an existing but highly complex system.

Posted in Online Security

« Previous Page