Image Credit: Markus Spiske
Snapwire

E-waste, or electronic waste, is the result of disposed electronic devivces and is the ugly off-spring of the technological world we live in. We often think of how good technology is for the environment by reducing out dependance on non-renewable resources. The materials used to manufacture electronics is also quite nasty, and the fact that many components can not be recycled. Most of the steel, copper, plastics, gold, and silver can be recycled. However, the lead used to solder the components to the circuit boards, along with the batteries, are very bad for the environment.

Image Credit: Ylanite Koppens from
Pexels

Encrypting is the abilty to encode information so that it can not be viewed without a decryption key. Encryption is important to protect the confidentiality and integrity of data, and many people will not find it suprising that there are countries that seek to ban their citizen from encrypting there data. In a world where devices are interconnected by the internet, the protection of data is as strong as the weakest link. We all can point to reasons why a business may need to encrypt the data of their customers, but what about the general populus? The justification in many cases is for national security. What happened to prohibiting unreasonable searches and seizures, or the right to due process?

Image Credit: Vladislav Reshetnyak from
Pexels

Not too long ago Facebook's CEO, Mark Zuckerberg, and appeared in front of Congress to speak about concerns surrounding data usage and protections. Many people were upset to find out that Facebook profits from the data it collects from its users, while others wonder what the big deal is. There are also those that wonder how money is made with this data.

Image Credit: Markus Spiske
Unsplash

In the last 30-40 years, Information security has come a long way. The future of information security will more focused around managing risk and less centered on the technologies. In a world were available resources are finite, having a methodology to identify and address real world issues is important. When it is understood the likelihood of various threats, and their impact levels, informed decisions can be made on the best way to address those threats. The assessed risk values helps to provide an unbiased way to choose if acceptance, avoidance, transference, or mitigation is the best option. Resources can be best utilized on mitigating risks that are within economic or resource abilities, and consider transference or avoidance for others.

Image Credit: Pixapopz
www.pixabay.com

I received an email regarding the review of Keepass. I am always glad to see that people enjoy the content we provide. In the email, a tool was mentioned to help generate passwords. I haven't had the opportunity to test this tool yet, but once I do, I will provide my thoughts on it.

Most people know by now the importance of have a secure password, and the risks involved with reusing passwords. The one thing that may confuse some, is what makes a good password?

Image Credit: Pexels
www.pexels.com

The internet has been around nearly 50 years and has helped produce so many innovative breakthroughs. While this may seem like a long time ago to many millennial's, the popularity of the internet did not start until the late 80’s early 90’s. Since then, so many things have changed, which has led our current adaptations. Nearly 3.2 billion people now have access to the internet, which is slightly less than half of the earth’s population.

Image Credit: geralt
pixelbay.com

I am sure by now you have heard about the WannaCry ransomeware attack that impacted millions of people. In a previous post, it was mentioned that one of the best ways to avoid falling victom to these types of attacks is by keeping your system up-to-date with the latest patches. We also covered other reasons to keep servers updated with the latest versions applications. These reasons also apply to your PC.




 

Follow Us

Copyright © 2007 - 2019. All Praise Media LLP. All Rights Reserved.