
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
WHAT IS REMOTE ACCESS?
Remote access is the ability for an authorized person to access a computer or a network from a geographical distance through an internet connection. It enables your users to connect to the systems they need when they are physically far away.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
When IoT technologies appeared on the horizons, the industries such as healthcare, smart cities, building management, public utilities, transportation, and manufacturing etc, picked it up early. Now, IoT is already being used by so many companies.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
What is QoS?
It is Quality of Service.
You would always want a kind of guarantee that--your network would be able to run all those applications that you assign as High-priority applications, as efficiently & reliably as possible. You would want that all the traffic to/from those high-priority applications gets first priority, even if your network is facing any type of limitation, e.g., network congestion. You can achieve this virtual guarantee with QoS - a set of technologies which work in tandem for your network.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
What is Machine Learning?
Machine Learning is an application of Artificial Intelligence.
The idea of Machine Learning basically is based upon the premise that we can make a machine (usually a computer) to learn from some massive amounts of data, so that it can make predictions when it is presented with new data.
Read more: Machine Learning - Role of Machine Learning in Cybersecurity

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
What is URL Filtering?
You and other employees in your company carry out a lot web/internet activities on daily basis, e.g., surfing your favorite websites, clicking on the links in the emails, accessing a number of web/cloud-based applications for your personal or business usages, etc. Each time you do any such thing, you are practically inviting a large number of threats to your corporate networks.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Quarterly Threat Insights Report of HP (March 2021) reported that approx. 29% of cyber-threats they observed were 'Unknown' cyber-threats, means, were not known before.
This post is intended to shift your attention to Unknown cyberthreats...

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
What is An Exploit Kit?
Let us first understand what an exploit is...
An exploit in most situations are some programs, files, or codes that are developed by threat-actors to take advantage of some vulnerabilities in a 'Software' or OS, to bypass your computers or network safeguards to infect your device.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
DNS is a critical and foundational protocol of the internet and it is often described as the 'Phonebook of the internet'. The primary purpose of DNS is to mapping domain names to IP addresses. DNS will translates human-friendly URLs, such as www.firstlook.com, into machine-friendly IP addresses, such as 192.167.82.137. Without DNS, it would be nearly impossible for us to find anything on internet. Right?

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Let yourself think from the perspective of a hacker...
You won't be happy or content with infecting just a machine of the targeted network. Will you? Of course not. Once you have gained an initial foothold, then you would want to pivot, infect and control other machines of the network too. This is when you would need a robust C&C communication with all those infected machines (called Zombies or bots). Your C&C would help you to maintain a persistent presence and to exfiltrate some valuable data later. You can control all zombie-machines via remote C&C.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Every time whenever you walk to a private doctor or into a private hospital, you are leaving behind a large information about yourself there. This set of information is quite important and you do not want this information to be disclosed. Sometime, you may make some personal disclosure to your private doctors, which you don't want to share with anybody else.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
When you decide to use any cloud storage service, you and your employees will be able to log in from anywhere using internet, to upload and retrieve their data.
But all cloud storage providers don't offer the same level of data protection options to you including cloud encryption...
- Information Security vs Cybersecurity . What is the Difference?
- What is Shadow IT? Why is Shadow IT a growing Risk ?
- What is Tokenization? How Tokenization is Different from Encryption ?
- How Can You Leverage Threat Intel BEST?
- What is Patch Management? Why is Patch Management Damn Important?
- What is Triage in Cybersecurity?
- What is a Cybersecurity Audit? 5 Best Practices for a Cybersecurity Audit
- What are CIS Controls? What was the need for CIS Controls - Version 8 ?
- What are Malicious Macros?
- What is Threat Modelling?