Skip to main content

Home/ AS level ICT/ Contents contributed and discussions participated by Billie-Jo Clarke

Contents contributed and discussions participated by Billie-Jo Clarke

Billie-Jo Clarke

Disaster Recovery Plan - 0 views

  •  
    A disaster recovery plan is a written plan describing the steps a company or individual would take to restore computer operations in the event of a disaster. Every company and each of its' department or division within an enterprise usually has it's own disaster recovery plan.
Billie-Jo Clarke

BUSINESS DATA TRANSFER CAN BE VERY RISKY - 0 views

  •  
    The volume of data that is shared between business entities is growing every year. Companies are constantly sharing information with each other. I.T. systems are linked to each other at various business contexts for example supplying, selling, regulation and management.
Billie-Jo Clarke

Privacy & Legal - 1 views

  •  
    This policy (together with our terms of use and any other documents referred to on it) sets out the basis on which any personal data we collect from you, or that you provide to us, will be processed by us.
Billie-Jo Clarke

Why Do Websites Use Cookies? - 0 views

  •  
    SolveYourProblem eLearning Series Internet Security A cookie is a small file that contains only text. It attaches itself to your hard drive for each website you visit during any given browser session. They are essentially messages for web sites that stay on your hard drive until you manually delete them, by yourself or with the help of software cleaning program.
Billie-Jo Clarke

Data protection Info-graphic <USE THIS IN YOUR CONCLUSION - 0 views

  •  
    Strategic insights on using IT to achieve business goals Human error plays a significant role in data loss. It is the culprit in 32 percent of cases, according to recent research. But what about the remaining 68 percent? Hardware malfunction, malware, software corruption and smackdowns dished out by Mother Nature are among the most common causes.
Billie-Jo Clarke

Twitter Hacks Infographic - 0 views

  •  
    When good Twitter accounts go bad. Whether it’s malicious intent or simple human error, Twitter users are increasingly at risk when it comes to protecting their privacy and reputation online. This infographic details several of the most recent and now infamous Twitter hacks, and examines common entry points for hackers, including weak passwords and malicious email attachments.
Billie-Jo Clarke

Virus Protection - 1 views

  •  
    The most important computing advice is "back up your files", which helps to safeguard your data if you ever get a virus. The second most important principle is "run an anti-virus protection program". If your anti-virus program does not include a good firewall, you must obtain one of those as well.
Billie-Jo Clarke

What is a Firewall? - 1 views

  •  
    A Firewall is a computer program that monitors the flow of information from the Internet to your computer. There are two different types of firewall available for you to use - Hardware Firewalls and Software Firewalls. A Hardware Firewall is a physical piece of equipment that sits between the Internet and your computer.
Billie-Jo Clarke

Infographic - The state of hacked accounts - 0 views

  •  
    October 6th, 2011 by Michal Harush | Category: Data & Research, Infographic | 1 Comment " Get the full report at: http://www.commtouch.com/state-of-hacked-accounts
Billie-Jo Clarke

What is encryption? - Definition from Whatis.com - 0 views

  •  
    Encryption is the conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people. Decryption is the process of converting encrypted data back into its original form, so it can be understood. The use of encryption/decryption is as old as the art of communication.
Billie-Jo Clarke

What is Risk Assessment? - 0 views

  •  
    Learn something new every day More Info... by email Within the workplace, owners of a business are legally required to assess the risks of injury and ill health affecting employees. Risk assessment is the careful examination of the diverse factors that can bring about these risks.
Billie-Jo Clarke

Natural Disaster Threat Maps - 0 views

  •  
    Are your systems well prepared? Can they imporve? Get a free assessment report. How well will your business get through its next disaster event? Get a free assessment report. Are your systems ready for this? Is there more to do? Get a free assessment report. Will your IT survive a disaster?
Billie-Jo Clarke

Human Error Causes Most Data Loss, Study Says - 2 views

  •  
    Human error accounts for three-quarters of incidents where sensitive data is lost, new research has revealed. A report from the IT Policy Compliance Group says a fifth of organizations are hit by 22 or more sensitive data losses a year, with customer, financial, corporate, employee and IT security data going missing because it is stolen, leaked or destroyed.
Billie-Jo Clarke

Hacking - 1 views

  •  
    Hackers often can be characterized by their motives. The following are the more common types of hackers and the motives they cite:
1 - 0 of 0
Showing 20 items per page