Also known simply as IDS or IPS, Intrusion Detection Systems / Intrusion Prevention Systems monitor network traffic for anomalies based on signatures and heuristics that vary from vendor to vendor and from implementation to implementation. Basically, they look for something that shouldn’t be there to log, alert, or take an action based on the rules we configure.
Encrypting emails between the sending and receiving servers sounds like a really good idea and when you think about it, it is. We often think of encrypting the communication between our endpoints and servers and between servers themselves to ensure our data is secure.
Like floppy disks, CRT monitors, and short commutes in light traffic, Anti-Virus seems to have fallen to the deep, dark recesses of the past. There was a time when we happily went about using our computers with little more than the operating system and a few basic applications and without the fear of the big, bad Internet.
The users of your information systems are the key to your organisation’s success. These are the people you have sought out to perform key roles in the organisation and the very prosperity and growth of the enterprise hinges on their engagement, capability, and capacity to deliver.