E-learning Blog

Spreading Security Awareness

Information Leakage from Job Portals

Gone are the days when people scan through employment newspapers to search for jobs suiting their skill-sets. This is the age of e-recruitment, where technology or web-based tools are used to facilitate the recruitment process. The available resources could be a dedicated career section in...

READ MORE

Demystifying Security Myths in Fibre Channel SAN

SAN or Storage Area Networks serve as pools of storage for servers in a network. It improves the storage utilization by consolidation of the space and making it accessible to applications. While there are a variety of communication protocols used by SANs, Fibre channel is currently the most...

READ MORE

Think like a Hacker, Defend like a Professional

Who the Hacker actually are? Hackers are соmmоnlу known for bеіng іntеrnеt рrеdаtоrѕ, іdеntіtу thefts and all-around creators of online сhаоѕ. But did уоu know thаt the term 'hacker' has bееn used ѕіnсе the 1960ѕ, and wаѕ tурісаllу considered as a nісknаmе for аnу соmрutеr рrоgrаmmеr? In...

READ MORE

Save Money and Improve Performance: Storage Capacity Optimization Techniques

Today, the humongous amount of data is required to be constantly accessed, stored, processed and managed by an organization at regular basis. This continuous increase in size of data, requires not only a performance based solution but should also be both flexible and economically feasible....

READ MORE

Data Storage Network Security: Ignore it and Get compromised

There would be no need for securing data storage network if you can save your information on the network without getting it compromised. However, in current trend and advance technologies assisted with free flowing information on Internet, it is almost impossible to ensure 100%...

READ MORE

Making your Data Future-Proof: Storage Backup and Replication

BAM! Was the sound I heard when my external hard drive kissed the floor. I can still hear the sound in my head today, even though it's more than a year now. I have also not forgotten the skipping sound the drive made after I took it off the floor. That was not a memorable day to...

READ MORE

Every Password is Insecure!!

Information on the internet is only as secure as your password. Many a times, Gmail, Yahoo, Dropbox, Evernote etc accounts are hacked or compromised making the online information vulnerable. Passwords that are not supported or protected by the two-step verification process are your...

READ MORE

Information Security Concepts | Ebook

In current world, Information is an important asset to everyone. In Business, where information plays a key role in success of any company. Business plans, customer database, product blueprints and road-maps are some of important example of information assets to any organization. At personal...

READ MORE