The ‘Security by’ model approach

It's only fair to share...Share on FacebookTweet about this on TwitterShare on LinkedInShare on Google+Email this to someonePrint this pageShare on RedditShare on StumbleUpon

Passionate about it! Intrigued by it! Confused by it! SaaS, RaaS, XaaS, what! what!, okay let me PaaS, oops meant pass! Unlike the as-aservice model that inherently loves prepending strange InfoTech words, I am going to talk about another model, that seems to enjoy appending weird random like words; the ‘Security by’ model! Don’t you just love it? Oops, I meant I.T! Security by Obscurity, Security by Isolation, Security by Default!; The ‘Security by’ model approach!

 

 

The ‘Security by’ model approach seems to share and rely on; 

Read more

MyBitSecure – Codename ‘D3m0’ Project

It's only fair to share...Share on FacebookTweet about this on TwitterShare on LinkedInShare on Google+Email this to someonePrint this pageShare on RedditShare on StumbleUpon

By MyBitSecure –  March 13, 2017 – mybitsecure.com

Have you ever had a brilliant I.T Security idea, which you needed an expert to tailor-make for you but where hesitant to pursue because you felt that you might end up not liking the idea / product at a later stage, or because of your fear of the costs involved? Well, look no further, The MyBitSecure Team will not only built an awesome custom solution for you, but will make arrangements to initially give you the Hardware-based security solution as a Demo unit to test drive (at no costs) for at least two weeks before you make your final decision. Below is a list of MyBitSecure’s I.T Security solutions on Demo! Read More

Securing your data with VeraCrypt

It's only fair to share...Share on FacebookTweet about this on TwitterShare on LinkedInShare on Google+Email this to someonePrint this pageShare on RedditShare on StumbleUpon

VeraCryptOne of the best ways of keeping people out of your private accounts or preventing unauthorised local access to your personal information is by not letting them on your Desktop or Laptop in the first place, but how do you go about it? Well, it’s straightforward, you create a password! Is that it?, well ‘sort of’, is the response I usually get. Of particular interest is one of the most common misconceptions “I like to call it – False Sense of Security!”, that is, colleagues who usually boast their user profiles are impenetrable because they have ten+ (10+) character long passwords, but then again, what happens if passwords fail you? Ask me and I will tell you it’s simple! Securing your data

Read more

WhatsApp Reborn – WhatsApp+ on steroids!

It's only fair to share...Share on FacebookTweet about this on TwitterShare on LinkedInShare on Google+Email this to someonePrint this pageShare on RedditShare on StumbleUpon

WhatsApp Reborn IconThe discontinuation of WhatsApp+ due to legal issues with WhatsApp led to the release of yet another more advanced version of WhatApp. Rafalense’s WhatsApp PLUS a.k.a WhatsApp+ had become one of the best and most used unofficial Mods of WhatsApp. It’s success was partly due to reasons I mentioned in an earlier post! Rahil Bhimjiani took over and came with another “Beast Mode ON” WhatsApp version he dubbed a rebirth of WhatsApp+. WhatsApp

Read more