ISO 27001 Compliance

Most organizations recognize the value of having security practices and procedures. However, when it comes to knowing what and how much is appropriate for your organization, it can be hard to know whether you have it covered or not. Enter […]

Read More

Security Consulting

Because the success of your business depends upon the safety of your information, ISCS stays on top of the latest IT security strategies. Our experienced consultants can perform a comprehensive assessment of your system and help you put programs in […]

Read More

E-mail Security and Encryption

One of the most common means of communication in this century is the ubiquitous e-mail message. As a consequence today’s business needs easy to use e-mail protection that doesn’t take hours per week to manage in order to ensure confidentiality, […]

Read More

IP Camera Surveillance solutions

With their inception in 1996, IP security cameras have now become the standard in the security industry. ISCS provides a wide range of fixed and dynamic IP camera surveillance solutions. The biggest advantage to IP cameras is the ease with […]

Read More
Latest Blog

BLOCKING TECHNIQUES

  IP blocking DNS tampering Blockpage Keyword Azerbaijan X   X   Bahrain   X X   China X     X Ethiopia X       India X X     Iran     X X Jordan X   […]

read more

GLOBAL INTERNET FILTERING

Evidence of filtering Suspected filtering No evidence of filtering Azerbaijan Belarus Afghanistan Bahrain Kazakhstan Algeria China Egypt Ethiopia Iraq India Israel Iran Kyrgyzstan Jordan Malaysia Libya Moldova Morocco Nepal Myanmar Russia[*] Oman Ukraine Pakistan Venezuela Saudi Arabia West Bank/Gaza Singapore […]

read more

ANONYMOUS EAVESDROPPING AND CALL REDIRECTION

Man-in-the-middle attacks have plagued networks for many years. Tools from Dsniff/fragrouter to Cain & Abel help show how network communication methods are not secure. Using the same model, telephone communication via VoIP can fall into the same problem space. While […]

read more

DATA MINING

As stated earlier, data mining is the process of posing various queries and extracting useful information, patterns, and trends, often previously unknown, from large quantities of data, possibly stored in databases. Essentially, for many organizations, the goals of data mining […]

read more

TROJAN PORTS

TCP 1 Breach.2001, SocketsDeTroie.230, SocketsDeTroie.250 TCP 28 Amanda.200 TCP 31 MastersParadise.920 TCP 68 Subseven.100 TCP 142 NetTaxi.180 TCP 146 Infector.141, Intruder.100, Intruder.100 TCP 171 ATrojan.200 TCP 285 WCTrojan.100 TCP 286 WCTrojan.100 TCP 334 Backage.310 TCP 370 NeuroticKat.120, NeuroticKat.130 TCP 413 […]

read more

COMPUTER CRIME

One need not be a law-enforcement officer or a computer-security expert to realize that computer crime is on the rise. These crimes range from computer-network administrators hacking into the computers of current and/or former employees to major credit-card theft and […]

read more

WEAK PASSWORD CRITERIA

It’s best to assume that a password that meets any of the following criteria is weak: It appears in the English dictionary It is the name of a well-known city anywhere in the world It is the name of any […]

read more

When to use BCC field in e-mail

Have you ever received an email that was forwarded to you with a joke, motivational story, cartoon, or warning about a hoax? Look at an email message that has been forwarded many times and count the number of email addresses […]

read more