Photo by Pixabay from Pexels

When you think of securing a building, one of the first things that may come up is to put up a fence, and maybe add a armed guard. Your next layer of defense maybe another guard or guard dog to roam the the property to address any threats that get past the fence and the gate guard. No security strategy would be complete unless you add locks on all of the doors and windows. The building may also include cameras and alarm as technical security measures as a last layer of defense.

Photo by panumas nikhomkhai from Pexels

Network (Net) neutrality is the principle that Internet service providers (ISPs) should treat all Internet communications equally and not discriminate or charge differently based on user, content, website, platform, application, type of equipment, or method of communication. The idea seems simple in theory, but most of the issues with net neutrality come from the classification of internet services by the Federal Communication Commission (FCC) under the Communications Act of 1934. Should Net Neutrality is should it be classified under Title 2 or Title 1 of the Communications Act of 1934. I have provided a link to the Communications Act of 1934, but have listed below what I believe are key issues with the internet being classified under either Title 1 or 2. Keep in mind that this document is 333 pages, and was authored long before the internet existed.

Image Credit: Markus Spiske

E-waste, or electronic waste, is the result of disposed electronic devivces and is the ugly off-spring of the technological world we live in. We often think of how good technology is for the environment by reducing out dependance on non-renewable resources. The materials used to manufacture electronics is also quite nasty, and the fact that many components can not be recycled. Most of the steel, copper, plastics, gold, and silver can be recycled. However, the lead used to solder the components to the circuit boards, along with the batteries, are very bad for the environment.

Image Credit: Ylanite Koppens from

Encrypting is the abilty to encode information so that it can not be viewed without a decryption key. Encryption is important to protect the confidentiality and integrity of data, and many people will not find it suprising that there are countries that seek to ban their citizen from encrypting there data. In a world where devices are interconnected by the internet, the protection of data is as strong as the weakest link. We all can point to reasons why a business may need to encrypt the data of their customers, but what about the general populus? The justification in many cases is for national security. What happened to prohibiting unreasonable searches and seizures, or the right to due process?

Image Credit: Vladislav Reshetnyak from

Not too long ago Facebook's CEO, Mark Zuckerberg, and appeared in front of Congress to speak about concerns surrounding data usage and protections. Many people were upset to find out that Facebook profits from the data it collects from its users, while others wonder what the big deal is. There are also those that wonder how money is made with this data.

Image Credit: Markus Spiske

In the last 30-40 years, Information security has come a long way. The future of information security will more focused around managing risk and less centered on the technologies. In a world were available resources are finite, having a methodology to identify and address real world issues is important. When it is understood the likelihood of various threats, and their impact levels, informed decisions can be made on the best way to address those threats. The assessed risk values helps to provide an unbiased way to choose if acceptance, avoidance, transference, or mitigation is the best option. Resources can be best utilized on mitigating risks that are within economic or resource abilities, and consider transference or avoidance for others.

Image Credit: Pixapopz

I received an email regarding the review of Keepass. I am always glad to see that people enjoy the content we provide. In the email, a tool was mentioned to help generate passwords. I haven't had the opportunity to test this tool yet, but once I do, I will provide my thoughts on it.

Most people know by now the importance of have a secure password, and the risks involved with reusing passwords. The one thing that may confuse some, is what makes a good password?


Follow Us

Copyright © 2007 - 2024. All Praise Media LLP. All Rights Reserved.