Home
Yatin's Blog
Cancel

Guardians of the Org: A Salesforce Admin’s Guide to Security

Overview Salesforce is the backbone of many organizations, housing sensitive customer data, business processes, and integrations. As Admins, we are the first line of defense against security threat...

UPI Lite - EXPLAINED!

Introduction A new payment option called UPI LITE makes use of the dependable NPCI Common Library (CL) application to process low-value transactions with a set value of less than 200. In order to ...

Password and Toothbrush : A Myth?

Introduction Password and Toothbrush has a very unique relationship as they both should be changed after the particular time frame and shouldn’t be shared among anyone. One could undoubtedly conten...

Social Engineering Explained

Introduction Social Engineering, otherwise called human hacking, is the specialty of fooling workers and buyers into uncovering their qualifications and afterward utilizing them to get to organiza...

Cyber Security - Now Or Never

Introduction “ Cyber Security alludes to the group of advancements, procedures, and practices intended to ensure systems, gadgets, projects, and information from attacks, harm, or unauthorized acc...

FIREWALL: DEFINITION, TYPES AND WORKING

Introduction A firewall is a system security gadget that screens approaching and active system traffic and allows or squares information parcels dependent on a lot of security rules. Its motivation...