Signatures are the distinctive way of writing own name indicating or authorizing anything be it a cheque or a document. Legible signatures are easy to read and mention the name of the signatory who signed that document. Illegible signature (complex signature) here means that the signature is executed in a way that the name is…
Author: AKGVG & Associates
Firewall in a computer network for computer and data protection
Technology is developing very rapidly, along with these developments some impacts need to be anticipated, namely the security of computer devices and data stored on the device. In the early stages of software development, data tampering was only a virus that could be cleaned with anti-virus and nowadays data hacking is growing rapidly in increasingly…
Security on the internet: An issue that demands the utmost attention
Nowadays, sites containing malicious software are quite common. The increase in cybercrime in recent years shows that security professionals need to take their jobs more seriously than before and businesses need to put more focus on endpoint and cloud app security to keep their data safe. Security is necessary for everyone! If we’ve been focusing a lot…
How to protect your systems with the EDR solution?
Endpoint Detection and Response (EDR) is a fairly recent concept that refers to security app/software that can detect complex known and unknown threats present on endpoints. Nowadays with an increasing number of connected devices and increasingly frequent and complex cyberattacks, an EDR solution is a necessary and emerging approach for the Endpoint security of every company. EDR is…
The increasing use of the Internet and the necessity of having a firewall and web application security
Nowadays, more and more people can access the internet easily. If in the past the internet was mostly accessed by young people, now adults can surf comfortably in the internet world. Along with the times, the use of the internet is increasingly inseparable from human life. The reason is, the internet provides information and media…
Chartered Accountant service in GST: All the advantages
The figure of the chartered accountant service in GST is truly indispensable for millions of workers engaged in the most disparate activities: his consultancy activity touches different areas, moving for example from tax obligations (such as filling in the tax return) to accounting (especially a fundamental activity for company owners). Filing GST returns and fulfilling tax obligations…
Control device access to network resources with network admission control
With access control to network resources (for example, file resources), everything is simple – there are users, there are resources, set access rights at the resource level and you’re done. But how to make sure that only those people whom you have permitted can access your corporate network? Network admission control is the answer and a…
Fraud triangle and fraud diamond theory
Corporate frauds are the frauds committed by the individuals against the organization who employed them and often this malpractice is done in a dishonest or an unethical manner. Corporate fraud is very hard to discover and very challenging to prevent at times. By incorporating policies, norms, and checklists, the company can somewhat mitigate the risk…
Allay security concerns with implementation of web application security
Cloud computing is becoming more and more important around the world with the development of 0public cloud and private cloud offers, as well as the proliferation of applications in SaaS mode. Companies take advantage of this, but they must be careful to protect themselves and call on experts in the field for ensuring Application security….
Endpoint Security: How to respond to increasingly complex threats
Faced with complex systems in companies, endpoint security has become a subject of major importance. Most endpoint security software, like Symantec endpoint protection, can deal with known and unknown threats using different technologies. Blocking known threats is the traditional mission of security software, via antivirus software for example. Unknown threats, on the other hand, are…










