Skip to content
Quick Links
  • Documents
  • Events
  • Published Books
  • About Me
  • Video

MOBS Bangladesh

Meeting of Brilliant Syche – IT Pro's Corner

  • Home
  • Books
  • Events
  • Publications
  • Video
  • Documents
  • About Me

Day: February 10, 2024

Firewall Protection

February 10, 2024February 16, 2024 Shuvro

Reading Time: < 1 minuteFirewall Protection Firewalls are network security devices that monitor and control incoming and outgoing network traffic based on predetermined security rules. They establish a barrier between secured and controlled internal networks and untrusted outside networks, such as the Internet. Using Read More …

CybersecurityCyber, cybersecurity, Firewall, Protection

Network Device Configuration

February 10, 2024 Shuvro

Reading Time: < 1 minuteNetwork Device Configuration Proper configuration of network devices is crucial for maintaining a secure network environment. Misconfigured network devices can provide loopholes that can be exploited by cybercriminals. Using Network Device Configuration benchmarks, such as the CIS Benchmarks, offers several Read More …

CybersecurityCyber, cybersecurity, Network, Network Device Configurations

VPN Access

February 10, 2024February 16, 2024 Shuvro

Reading Time: < 1 minuteVPN Access Virtual Private Networks (VPNs) provide a secure connection to another network over the Internet. They can protect your web traffic from snooping, interference, and censorship. Some best practices for VPN Access: Use Strong Encryption: Always use a VPN Read More …

Cybersecuritycybersecurity, VPN Access

Enterprise Architecture Strategy (EAS)

February 10, 2024February 16, 2024 Shuvro

Reading Time: 2 minutesEnterprise Architecture Strategy An Enterprise Architecture Strategy provides a long-term view of a company’s processes, systems, and technologies so that the organization can align its business strategy with its IT strategy. This alignment is crucial in ensuring that the organization Read More …

Cybersecuritycybersecurity, Enterprise Architecture Strategy

Change Management (CM)

February 10, 2024February 16, 2024 Shuvro

Reading Time: < 1 minuteChange Management (CM) Change Management in cybersecurity involves the systematic approach to dealing with change, both from the perspective of an organization and the individual. A well-designed change management plan can help prevent security lapses during the transition process. Here Read More …

CybersecurityChange Management (CM), cybersecurity

Privileged Access Management (PAM)

February 10, 2024February 16, 2024 Shuvro

Reading Time: < 1 minutePrivileged Access Management (PAM) PAM is a solution that helps organizations restrict privileged access within an IT environment. It minimizes the risk of security breaches by ensuring that only authorized users can access sensitive data and systems. Here are some Read More …

Cybersecuritycybersecurity, Privileged Access Management (PAM)

Identity and Access Management (IAM)

February 10, 2024February 16, 2024 Shuvro

Reading Time: < 1 minuteCybersecurity is a never-ending battle. As technology evolves, so do the threats that seek to exploit it. This blog post will delve into key areas of cybersecurity, including Identity and Access Management, Privileged Access Management, Change Management, Enterprise Architecture Strategy, Read More …

Cybersecuritycybersecurity, Identity and Access Management (IAM)

Posts navigation

Older posts

YouTube

http://www.youtube.com/ user/shuvromcse

Categories

Monthly Archives

MOBS Calendar

February 2024
S M T W T F S
 123
45678910
11121314151617
18192021222324
2526272829  
« Nov   Mar »

Creative Commons

The opinions and views expressed in this blog are those of the author and do not necessarily state or reflect those of any vendor's regardless of hardware or software.

All contents is provided "AS IS" with zero warranties and warnings, and confers no rights. You assume all risk for your use.

All the Trademarks are the property rights of their respected owners.

NOTE: Please be aware I get lots of emails, and I cannot assist and fix everyone's problems. Also, please do not be offended if you do not get a response.

Testimonials

saranaHe is a proactive and tireless contributor who would make a great addition to any team. He is technologically very sound and I would highly recommend him for any technical position, as he naturally rises to the occasion when presented with something he is passionate about.

Sarana IslamBusiness DevelopmentOracleSingapore
DeependraShahab have been hugely extending his hands to Nepal market support apart from his daily duty of Bangladesh Sub with his deeper knowledge in various Microsoft technology to many of our customer and is really adding value to Nepal business
Deependra BajracharyaPartner Sales ExecutiveMicrosoft NepalNepal
1 2 3 4 5

An extremely knowledgeable person in his field of work. He takes learning and applying new technology at work as a continuous process. A problem solver within a given period of time and cost. I wish him all the best.

Wahidur Rahman Khandkar
I am working closely with Shahab for a little more than 3 years, and I know him both in  professional and personal capacity. Shahab amazed me with his integrity, trust, and unbelievable depth of Technological facts. I have never met anyone so competent in his/her profession. Shahab upgrades himself continually and I am so lucky to meet such a rare gentleman. He would be an asset to any organization who has engaged Shahab for his experience.
Ismail Jabih UllahHead, Org Development & TrainingLink3 Technologies Ltd. 
AhsanShahab is a thorough tech analyst who has made impact in Public Sector accounts while discussion went from opportunity creation to a maximization of technology utilization and value proposition.
Ahsan SharifPS DirectorMicrosoft BangladeshDhaka, Bangladesh
SabeelShahab is the most technically sound guy I ever had the opportunity of working with.
Sabeel RahmanAccount Manager, EPGMicrosoft BangladeshDhaka, Bangladesh
kanwarShahab, Your site is really fantastic. Contents compilation are awesome. Thank you very much for saving my time.
Khandaker AnwarAB Bank LimitedDhaka, Bangladesh
TanzimShahab is an extra-ordinarily productive specialist on Microsoft’s server tool business. He is an exceptionally brilliant problem solver when it comes to designing solution architectures and developing infrastructures & deployment models.
Tanzim SaqibDeveloper EvangelistMicrosoft BangladeshDhaka, Bangladesh
KennethShahab is a very detail person and constantly striving to help customers to achieve the best value.
Kenneth Ng Sin KwangTechnical SpecialistMicrosoft MalaysiaMalaysia
Start
Stop
NextPrev

Twitter

Tweets by ShahabAlYaminCh
Copyright mobs-bd.org. All rights reserved.
Proudly powered by WordPress | Education Hub by WEN Themes