I am Creative

IT Security Consultant

A single place to get digital graphic and
web design identity and
digital certificates for your coorporation

Latest from the Blog

Secure Your Communications with ProtonMail

GET YOUR ENCRYPTED EMAIL ACCOUNT End-to-End Encryption Messages are encrypted at all times Messages are stored on ProtonMail servers in encrypted format. They are also transmitted in encrypted format between our servers and user devices. Messages between ProtonMail users are also transmitted in encrypted form within our secure server network. Because data is encrypted atContinue reading “Secure Your Communications with ProtonMail”

The Top 6 overlooked IT Security Vulnerabilities in today’s Businesses

The Top 6 overlooked IT Security Vulnerabilities in today’s Businesses 1. Host Vulnerabilities – No EOL policy, Not updated – How the OS/platform is configured – What services are running, programs installed, security settings enabled – Leaving host with default configuration is often insufficient – Evaluate custom configurations  (example: failing to disable telnet can leadContinue reading “The Top 6 overlooked IT Security Vulnerabilities in today’s Businesses”

Top Ten IT Security Vulnerabilities

1. Human Errors 2. Lack of Security Awareness 3. Weakness in Protocols 4. Design Errors 5. Policy Flaws (or having No Security Policy) 6. Software Vulnerabilities 7. Misconfiguration (of security devices or infrastructure devices) 8. Servers (endpoints) 9  Malicious Code 10. Lack of oversight

Get new content delivered directly to your inbox.

Create your website with WordPress.com
Get started