Posts

Showing posts from July, 2021

How to Defend Security Threats?

Image
  IT Security services  are constantly evolving and responding to emerging threats. Web 2.0 is known as the second generation of the World Wide Web. This context refers to the design, development, and use of websites that promote interaction, interoperability, and collaboration on the Internet. In contrast to non-interactive websites, where users are limited to passively viewing information, Web 2.0 sites allow users to interact with other users or even change website content.   A SECURITY POLICY FOR WEB 2.0 SHOULD BE INCLUDED   Enterprise computing environments already have some form of acceptable use policy to govern the use of all resources. Even though many public 2.0 sites are implicitly covered in your current policies, a more explicit statement of expectations and policies is necessary.   DEFEND YOUR TECHNICAL SECURITY   For this traffic, firewalls, intrusion detection/prevention systems, and bandwidth-shaping technologies need to be updated. Firewal...