Trustaira Blog
April 29, 2018        Trustaira Staff

The acronym SQL (pronounced SEQUEL) stands for Structured Query Language, a language for querying and editing information stored in a certain database management system. SQL was developed in the early 1970s by some people working for IBM. Short after that, in 1979, a company called Relational Software, which later became Oracle Corporation,  released its own modified version of SQL. Today, SQL is used in many products, including…

Read More »

 
February 20, 2018        Trustaira Staff

  A malicious insider is a trusted insider who abuses his/her privileges in a system to hinder the system’s operations, damage data, or disclose sensitive information which causes damage to the system. Malicious insider threat is one of the most dangerous threats to any organization. By being an insider, he/she have already gotten past your first defense and they might be interested by a desire…

Read More »

 
February 1, 2018        Trustaira Staff

The use of mobile and hand-held devices reaches at an all-time high. Mobile Banking Security risk is very high as well. According to a KPCB (Kleiner Perkins Caufield & Byers) report, mobile digital media is now outpacing desktop usage. The report stated that adults with access to digital media use mobile 51 percent of the time compared to 42 percent for desktop usage and 7…

Read More »

 
May 16, 2017        Trustaira Staff

It is no secret the number of cyber-attacks is on the rise. As more time goes by, cyber criminals are becoming more sophisticated with nature of attacks.  So, we always need to stay alert on this issue as our dependency over technologies is increasing day by day. Usually financial sector, along with energy and national defense sectors, is most affected one from this phenomena.  NOW…

Read More »

 
January 11, 2017        Trustaira Staff

  In the previous article, we talked about some major corporate security risks and their solutions. In this article, we are focusing on corporate security best practices. There are many; but like stated before, we will talk mostly about those which are applicable from our country’s perspective. 1. Encryption Encryption is a process of securing data, information, and device in a way to prevent being accessed…

Read More »