Archive / 3.1 Information Tehnology

RSS feed for this section

Appropriate access rights

When it comes to means of data protection, most people can only think of passwords. Yes, they prevent any third party access obviously and are essentially as important as any other security measure, one thing often overlooked however are the access rights. We say ‘access rights’ in terms of what data and actions the user […]

When is a password good?

There is a saying that you simply cannot repeat some things enough. One of those areas is security. Whilst physical security in terms of alarms, locked doors etc is as important, with this post we are focusing on data protection and namely passwords. It has come across in our practice, that there are programs with […]