Lavanya
Bio:
Lavanya Rathnam is a professional tech writer who has been contributing to prominent blogs and publications in the technology space for more than a decade.
She is a creative thinker, out-of-the-box content builder, and tenacious researcher who specializes in explaining complex ideas to different audiences. Her master's degree in Computer Applications enables her to empower her readers with technical knowledge and help them keep up with the rapid pace of technological advancements.
Lavanya has been writing on online security, application monitoring, big data, Internet of Things, Crypto, decentralized technology, Self-Sovereign Identity, Web 3.0, and more. She has extensive experience in authoring whitepapers on ICO, cybersecurity, and decentralized technology. Her "how-to" guides, in particular, have a wide readership running into millions for some of her articles.
She continues to combine her experience and expertise to provide well-researched content that helps audiences make informed decisions to address their everyday challenges.
Reach out to her on LinkedIn.
By Lavanya Rath on June 10, 2022
Insider threats are broadly defined as threats that come from within the organization. Typically, these threats are due to disgruntled current and former employees who want to take “revenge” on the company. Sometimes, it can also be for gain, where these employees take money from competitors and pass on the organization’s secrets to them. These […]
By Lavanya Rath on May 27, 2022
Data breaches have become more common than we’d like, and this frequency is attributed to a wide gamut of reasons that span from sophisticated strategies used by hackers to poor security practices of organizations. One technology or practice that’s seen as a key strategy to protect your data is encryption. According to the Ponemon Institute, […]
By Lavanya Rath on May 27, 2022
Encryption software is a tool that protects your data by encrypting and decrypting it. Essentially, it uses an algorithm, also called the encryption key, to morph your data into a series of letters and numbers that look like gibberish to anyone who looks at it. But, authorized users who have the encryption key can use […]
By Lavanya Rath on May 4, 2022
Data is one of the most valuable assets today. Companies around the world are collecting and analyzing billions of data bits every second to get a holistic idea of their customers’ preferences and behavior. Using this information, companies can provide targeted advertising, that in turn, is sure to boost their revenue. Personally Identifiable Information (PII) […]
By Lavanya Rath on April 18, 2022
Do you know that 60% of data breaches are insider threats? Also, the average cost of each of these threats is a whopping $11.5 million. These numbers clearly show the widespread prevalence of these thefts and the huge impact it has on an organization. More importantly, these high numbers emanate from the fact that these […]
By Lavanya Rath on March 23, 2022
Digital users like us are constantly looking for ways to securely transfer files to colleagues, friends, and family members. This file-sharing is more critical in organizations as it could involve sensitive data, which in the wrong hands can jeopardize the company’s operations. The work-from-anywhere culture has further accentuated this requirement for secure file-sharing. In turn, […]
By Lavanya Rath on March 10, 2022
Troubleshooting is one of the most difficult aspects of an application or system. Many times, it is a wild goose chase until you know where the problem is and its cause. This is where log files come in handy as they point you in the right direction, so you are more productive, efficient, and quick […]
By Lavanya Rath on November 16, 2021
Getting a packet across networks involves routing and a router requires an address to send the packet to. A packet header contains both a source and destination address and this address is the fundamental component of the Internet Protocol – it is called the IP address. The IP address is allocated to a device but […]
By Lavanya Rath on November 15, 2021
Active Directory is one of the most popular ways to handle user-related activities within an organization, including adding new employees, authentication, streamlining access to apps, deletion of past employee records, modifying access, and more. While handling these varied aspects of user management, network administrators may also face some issues or inconveniences. Though they are a […]
By Lavanya Rath on September 22, 2021
Email attachments are the most preferred way to transfer files, but what happens when they exceed the limit imposed by email service providers? Well, as frustrating as it may be, the silver lining is that there are other ways to transfer large files to your recipients, and in this article, let’s look at some of […]
By Lavanya Rath on September 22, 2021
Encryption has become the de-facto feature of online security today. Almost every company and application seems to use it to encrypt their data to protect it from unauthorized access and manipulation. The encryption is often based on the Secure Socket Layer (SSL) or the Transport Layer Security (TLS). While this is a great way to […]
By Lavanya Rath on September 4, 2021
Switches are an integral part of every network as they connect devices and enable them to communicate. There are two kinds of switches, namely unmanaged and managed. Unmanaged switches are plug-and-play devices that require no configuration. At the same time, they are suited only for basic connectivity, often in home networks or in places that […]
By Lavanya Rath on September 4, 2021
Directory services can be a critical component to managing your IT infrastructure. They connect users with the set of services available in a network and give IT admins granular control over who uses what within a network. A well-known directory service is Active Directory, introduced by Microsoft in 1999 as a part of its Windows […]
By Lavanya Rath on August 31, 2021
Have you experienced patchy VoIP calls and slow-loading websites? Well, they could be because of something called packet loss. In this article, we will learn what packet loss is and how you can fix them with the right tools. Here is our list of the best free and paid tools to fix packet loss: ManageEngine […]
By Lavanya Rath on August 31, 2021
Simple Network Management Protocol, or SNMP in short, is a framework used to manage a wide range of devices on the Internet. Typically, it monitors these devices and detects any problems or network faults in them. This Internet Standard protocol works on the Application layer of the OSI model and gathers details from applications that […]