wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

How secured are you online ?

profile
Sohrab Vakharia
Aug 02, 2017
0 Likes
0 Discussions
492 Reads
This question comes to our mind everytime we do any sort of transaction online. We believe that we are safe as there are companies established to take care of our data. While banking we believe that banks take care of everything. We often believe that if  anything goes wrong then we can contact customer support and will get solutions of our life. Do you really think your are secured? I don't get this statement " staying safe online" . Let me tell you some industrial facts. Now there are security professionals and organisations, giving information security solutions to the companies. When a chief information security officer or a certified information security auditor issues a certificate to the company they conclude the amount of security using a percentage metric. The maximum amount of security promised to any organisation is just 5%. Now well I am sure this will drive you crazy, like hell had fallen upon you. But let me throw more light on it. When it is said that we are 95% insecure, that means there are 95% techniques available for exploiting the security measures. Agreed!! But who really knows these techniques? Do we know? No. I don't think so. As it is said "ignorance is bliss." Truly it is. Less than 2% people staying would know these exploits and hence we feel safe. Amazing!! Isn't it ?  ?? Feel free to drop your queries below.

Comments ()


Sign in

Read Next

RACI model in IT services

Blog banner

Social Engineering Attacks

Blog banner

breakup? don't worry and learn how to get back your life!

Blog banner

Natural Language Processing(NLP)

Blog banner

From Loom to Luxury: How Patola Elevates Modern Wardrobes

Blog banner

Memory Management of Operating System(OS)

Blog banner

CYBER SECURITY CHALLENGES

Blog banner

Hacking Mobile Platforms

Blog banner

Meal Maharaj — 3 CP, 5 CP, 8 CP. Same Love, Different Portions

Blog banner

How GIS in Agriculture Eliminates Guesswork

Blog banner

How to grow followers on Instagram business account?

Blog banner

Measuring IT Risk

Blog banner

LinkedIn: Watch out for these 7 upcoming updates in 2023

Blog banner

Memory Management

Blog banner

The Dark Web: A Breeding Ground for Cybercriminals – How to Guard Against Threats

Blog banner

objectives and functions of operating system

Blog banner

Education?

Blog banner

Virtual memory

Blog banner

Deadlock and Starvation

Blog banner

What is semaphore in operating system?

Blog banner

virtual machines and virtualization

Blog banner

I/O Buffering

Blog banner

Deadlock and starvation

Blog banner

Process Description

Blog banner

Simple Ways to Grow Your Brand Online

Blog banner

BASICS OF SHARE MARKET

Blog banner

Mobile Transport Layer – Traditional TCP

Blog banner

Paralysis/Paralysis Stroke

Blog banner

Evolution of operating systems

Blog banner

GIS in Disaster Management

Blog banner

KPMG (Klynveld Peat Marwick Goerdeler)

Blog banner

MULTITHREADING:ENHANCEING PERFORMANCE AND EFFICIENCY IN COMPUTING

Blog banner

Why is online marketing is important in current scenario

Blog banner

Why Data Privacy Is Changing Online Advertising

Blog banner

Network Forensics Tools and Techniques

Blog banner

Digital Footprints An Emerging Dimension of Digital Inequality

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

Data Visualization

Blog banner

This Windows 11 encryption bug may cause data damage

Blog banner

OS DESIGN CONSIDERATIONS FOR MULTIPROCESSOR

Blog banner

Evolution of Operating System

Blog banner

Practical Implementation of Client Server model using TCP/IP.

Blog banner