myths

No Image

Myth: hiding your wireless network’s name improves its security

Many think that what is not visible to an attacker is not going to be attacked. While this might be true for physical security, it doesn’t apply to cyber security. Security experts name this approach…

Read More

No Image

Myth #21: effort and costs are reduced if we outsource

Well, at the first glance, this Myth might actually be true… But… It is never so simple to speak only about cost and effort. Let’s take software development as main example (I am good at…


No Image

Myth #20: If I use SSL to send emails nobody can peek into my emails

It is true that if you connect to the email server via SSL (actually, using the SMTPS protocol) nobody can peek into your email… until they reach the server.            …


No Image

Myth #19: Free security solutions are all I need

Well… there is some truth here. It is true that one can live exclusively with security solutions that don’t cost anything.           But, there are other costs associated: – overhead in…


No Image

Myth #18: backup on an external disk is the safest as it can be

Nothing can more wrong than assuming this. HDDs fail ! This is since, and there is a good theory behind it. Each HDD producer has a MTBF – Mean time between failures. Wikipedia says: Mean…


No Image

Myth #17: Security is the CISO’s problem

Chief Information Security Officer (CISO),also known as Chief Security Officer (CSO), are those responsible for the security in the company. They are the security heros.  And, if something bad happens, then is their fault.      …


No Image

Myth #16: Security risks can be quantified

In an ideal world, it may be true, but the reason for this misconception is actually the fact that managers need to justify their expenses and tend to put a price shield on everything. How…


No Image

Myth #15: Macs never get infected

Unfortunately, this is very far away from the truth. We see more and more Trojans that are attacking the platform and from time to time there is also malicious software available in the AppStore.  …


No Image

Myth #14: If a website is using SSL it must be secure and reliable

It is true that SSL adds a layer of protection. But, anybody can generate an SSL certificate and we know of cases where malicious websites even made use of stolen SSL certificates. Always check that…


No Image

Myth #13: Any computer virus will produce something visible on the screen

The times when viruses were made for fun are long gone. Cybercriminals are trying all the time to make their software remain undetected as long as possible. For them, the saying “time is money” really…


By continuing to use the site, you agree to the use of cookies and to its Privacy Policy more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close