IT Sec FAQ – Detectify Blog


We love talking about security and we believe that security knowledge should be easily accessible and fun. This is why we came up with our IT Sec FAQ series! In 10 short Q&A format posts, we explain basic web security concepts combined with tips and comments from our very own security experts.

Detectify’s IT Security FAQ – Click on the question you want to learn more about!

IT Security FAQ 1: What should you think about when approving an app on Facebook?

Facebook is brimming with apps – quizzes, games, corporate sweepstakes and much more. What kind of information do you share when you approve apps on Facebook and what are the security implications of allowing them to access your account?

IT Security FAQ 2: What should you think about when installing a new plugin on WordPress?

Plugins can add a wide range of fun and useful functions to the popular CMS WordPress, but it is important to keep in mind that most WordPress security breaches happen because of vulnerable plugins. How can you maintain a balance between security and functionality and decide which plugins to install?

IT Security FAQ 3: What password-managers are good? Why should you use one?

It’s extremely risky to use the same password for different user accounts, but remembering multiple passwords is tough! To keep track of all your passwords and stay safe online, you can use a password manager.  In this post, we explain how such tools work and give tips on which password managers to choose.

IT Security FAQ 4: Is two-factor authentication really necessary online? How do you activate it?

Ever wondered about the advantages of two-factor authentication and whether you should use it? Read this IT Security FAQ snippet to learn more about two-factor authentication and its uses.

IT Security FAQ 5: What is White Hat vs Black Hat hacking? And what is a bug bounty hunter/program?

You might have heard of white hats, black hats and bug bounties before, but what do these terms really mean? Read on if you want to add these new words to your vocabulary!

IT Security FAQ 6: What CMS is the most vulnerable?

Trying to settle on a CMS and not sure what to choose? We explain what you should keep in mind when picking a CMS.

IT Security FAQ 7: What is OWASP Top 10?

OWASP is often mentioned in web security discussions and in this FAQ post, our expert Johan Edholm explains what OWASP Top 10 is all about and why it’s a great resource for developers.

IT Security FAQ 8: SSL? Https:// – how do you connect it? What info should be encrypted?

If you’re curious about SSL and how it works, this post is for you! Learn more about SSL and how you can benefit from activating it on your site.

IT Security FAQ 9: What is the difference between a firewall, antivirus and other security services like Detectify?

What is the difference between a firewall, antivirus and other security services like Detectify? Find out here!

IT Security FAQ 10: What is a malware, phishing, spyware, data mining and DDoS?

Curious to know what malware, phishing, spyware, data mining and DDoS is? Check out the final IT Security FAQ here!



Source link