General

Profile

dewi IT

  • Login: dewi
  • Registered on: 05/29/2020
  • Last connection: 03/19/2024

Issues

open closed Total
Assigned issues 0 0 0
Reported issues 0 0 0

Projects

Project Roles Registered on
IT Policy, Standards & Guidelines Manager 06/03/2020
Data Storage Policy and Guidelines Manager 06/03/2020
E-Mail Setup Guideline Manager 06/03/2020
PDAs and Other Mobile Devices Policy Manager 06/03/2020
Privacy Policy Manager 09/04/2020
Tuntex File Server Storage, Backup & Recovery Manager 06/03/2020
TUNTEX Wi-Fi Policy & Disclaimer Manager 06/03/2020
TUNTEX SYS IT SERVICE DESK Manager 06/03/2020
Tuntex SYS Internet Policy Manager 06/03/2020

Activity

07/08/2021

11:19 AM TUNTEX SYS IT SERVICE DESK What is extortionware?

Extortionware is the latest stage in the evolution of ransomware. No longer content with simply encrypting a victim’s...

dewi IT

02/10/2021

10:00 AM TUNTEX SYS IT SERVICE DESK How a VPN (Virtual Private Network) Works

How Virtual Private Networks Work

A VPN connection to a business's main office can help its employees be productiv...

dewi IT

08/27/2020

10:21 AM IT Policy, Standards & Guidelines ITG_SYS003_Spam Mitigating Guidelines and Best Practices.pdf

spam_guideline

dewi IT
10:21 AM IT Policy, Standards & Guidelines ITG_SYS002_TuntexCloud_Guideline.pdf

tuntex_cloud_guideline

dewi IT
10:20 AM IT Policy, Standards & Guidelines ITG_SYS001_Penggantian_Password_Guideline.pdf

change_pass_guidelines

dewi IT

06/03/2020

09:08 AM Tuntex SYS Internet Policy SOCIAL ENGINEERING

Social Engineering Attacks

Examples of social engineering range from phishing attacks where victims are tric...

dewi IT
09:07 AM Tuntex SYS Internet Policy What’s the Diff: VMs vs Containers

Both VMs and containers can help get the most out of available computer hardware and software resources. Containers a...

dewi IT
09:06 AM Tuntex SYS Internet Policy Work From Home In The Current Corona Virus

How To Undertake Work From Home  In The Current Coronavirus Crisis?

 

The ongoing international pandemic regard...

dewi IT
09:05 AM Tuntex SYS Internet Policy What is Malware?

Malware Defined, Explained, and Explored

The term malware is a contraction of malicious software. Put simply, malw...

dewi IT

Also available in: Atom