As we’ve mentioned before, there are three basic components to business continuity: There’s offsite backup, disaster recovery, and data protection as a service (DPaaS). While offsite backup and disaster recovery are the more well known pieces, data protection has an important role, too. Below are a few examples of practical applications of data protection as a service in everyday business: Example A: Company A is a data clearinghouse for the healthcare insurance industry, and needed a better way to handle …

Note: This is a guest post by Sam Youness, who has 20 years of experience history in technical and solutions architecture, engineering, and consulting, with more than 12 of those at Microsoft, specializing implementing the newest technologies for his clients. Sam is also a Microsoft Certified Azure Architect. The Spectre and Meltdown vulnerabilities have shaken the IT industry and left some people wondering about the security of their mission-critical data in a multi-tenant environment. Data hosting is still a viable option …

IT magazine The Register reported that there was a major flaw with Intel, AMD, ARM and POWER chips that affect virtually every single computer ever made in the past 20 years. What a way to bring in the new year, eh? There are two flaws: One is called Spectre, and the other is Meltdown. Meltdown primarily affects Intel and ARM chips, where bad actors can get the CPU to reveal application information from the machine kernel, such as passwords. The good …

We gave Amazon’s S3 storage buckets an honorable mention on our biggest data breaches of 2017 list, and in this post, we’ll explain why we did that. What makes these types of breaches so important to point out? For those who missed it, here’s what happened: AWS users can store their files (known as objects) in what are known as S3 storage buckets. Amazon defaults these S3 buckets to be closed instead of open, but over the course of several …

As we did in 2016, we’re rounding up the biggest data breaches of 2017. What have we learned as a result, and what can companies do better next year? Equifax: The loss of 145 million records may not be the highest in history, but the value of information very well might be. Thanks to an unpatched flaw in an Apache Struts server, names, dates, social security numbers, and more were compromised. Most of the records were American, but about a …

Ransomware predictions for 2018

Posted on December 18, 2017 by

According to cybersecurity firm Bitdefender, ransomware is now estimated to be a $2 billion a year business. At the start of 2016, it was already a billion dollar business, but thanks to WannaCry, NotPetya, and the thousands of other ransomware attacks across the globe, revenues have doubled. What does that mean for ransomware in 2018? Unfortunately, it doesn’t show signs of stopping. Bitdefender says ransomware developers are experimenting with targeting the GPU (Graphics Processing Unit) instead of the CPU (Core Processing …

The Payment Card Industry Data Security Standard (PCI DSS) is required for any organization that processes, stores, or handles transactional financial data. It was first released in 2004, and offers 12 requirements that companies must meet in order to claim PCI compliance. However, just because a company meets the PCI standards once doesn’t mean it’s permanently compliant. So if organizations claim PCI compliance, why is it so hard for them to maintain it? Well, the news is not all bad. …

Two factor authentication is widely recommended as a security practice to give an extra layer of protection to your network and personal accounts, but according to security researchers, if you use SMS texts as your second form of authentication, they could be subject to interception and exploitation. Security researchers demonstrated how easily they were able to manipulate the two-factor set up on a Bitcoin wallet account, simply by intercepting the text message sent over the cellular network. Once they reset …

With all the deals that can be found on Black Friday and Cyber Monday, it’s time to start scoring great deals online. But only half of consumers say they can determine whether the site they’re visiting is safe and legitimate, according to a survey by the Global Cyber Alliance. Here’s 6 ways on how to stay safe during the holiday shopping season. Check the URL of the site you’re visiting. Sophisticated phishing attacks can do a great job of making …

We talked a little about serverless computing, and its basic building blocks known as functions in an earlier post. Functions have their own service, conveniently called Function as a Service (FaaS). What are functions, and how do they relate to serverless computing? FaaS is the concept of serverless computing using serverless architectures. It especially affects software developers, who can leverage this concept to deploy an individual “function”, action, or piece of business logic. These functions are expected to start within milliseconds …

Get started now. Exceptional service awaits.

Live Chat