We gave Amazon’s S3 storage buckets an honorable mention on our biggest data breaches of 2017 list, and in this post, we’ll explain why we did that. What makes these types of breaches so important to point out? For those who missed it, here’s what happened: AWS users can store their files (known as objects) in what are known as S3 storage buckets. Amazon defaults these S3 buckets to be closed instead of open, but over the course of several …

As we did in 2016, we’re rounding up the biggest data breaches of 2017. What have we learned as a result, and what can companies do better next year? Equifax: The loss of 145 million records may not be the highest in history, but the value of information very well might be. Thanks to an unpatched flaw in an Apache Struts server, names, dates, social security numbers, and more were compromised. Most of the records were American, but about a …

Ransomware predictions for 2018

Posted on December 18, 2017 by

According to cybersecurity firm Bitdefender, ransomware is now estimated to be a $2 billion a year business. At the start of 2016, it was already a billion dollar business, but thanks to WannaCry, NotPetya, and the thousands of other ransomware attacks across the globe, revenues have doubled. What does that mean for ransomware in 2018? Unfortunately, it doesn’t show signs of stopping. Bitdefender says ransomware developers are experimenting with targeting the GPU (Graphics Processing Unit) instead of the CPU (Core Processing …

The Payment Card Industry Data Security Standard (PCI DSS) is required for any organization that processes, stores, or handles transactional financial data. It was first released in 2004, and offers 12 requirements that companies must meet in order to claim PCI compliance. However, just because a company meets the PCI standards once doesn’t mean it’s permanently compliant. So if organizations claim PCI compliance, why is it so hard for them to maintain it? Well, the news is not all bad. …

Two factor authentication is widely recommended as a security practice to give an extra layer of protection to your network and personal accounts, but according to security researchers, if you use SMS texts as your second form of authentication, they could be subject to interception and exploitation. Security researchers demonstrated how easily they were able to manipulate the two-factor set up on a Bitcoin wallet account, simply by intercepting the text message sent over the cellular network. Once they reset …

With all the deals that can be found on Black Friday and Cyber Monday, it’s time to start scoring great deals online. But only half of consumers say they can determine whether the site they’re visiting is safe and legitimate, according to a survey by the Global Cyber Alliance. Here’s 6 ways on how to stay safe during the holiday shopping season. Check the URL of the site you’re visiting. Sophisticated phishing attacks can do a great job of making …

We talked a little about serverless computing, and its basic building blocks known as functions in an earlier post. Functions have their own service, conveniently called Function as a Service (FaaS). What are functions, and how do they relate to serverless computing? FaaS is the concept of serverless computing using serverless architectures. It especially affects software developers, who can leverage this concept to deploy an individual “function”, action, or piece of business logic. These functions are expected to start within milliseconds …

Companies in the US are finally starting to pay attention to the General Data Protection Regulation (GDPR) news that’s been coming out of Europe lately, because compliance will be enforced starting May of 2018. That’s not a lot of time to get ready. What is this new regulation, why did it come about, and what does it mean exactly for companies in the U.S.? History behind GDPR What happened to make the EU stand up and say, “Hey, we need …

Cybersecurity journalist Brian Krebs noted on his website the security and simplicity of adding a vocal password to your authentication process when you call a company such as a bank or investment firm to obtain access about your account. Voice passwords are a great idea. They can be a very effective security measure if a hacker calls your bank to open a fraudulent account in your name or requests a large transfer out of your account. Most banks require only your …

What is serverless computing?

Posted on November 1, 2017 by

What is serverless computing? The idea is growing in popularity, but the term honestly sounds like an oxymoron. How does it work, and why should you consider it for your IT organization? Well, the name is a false promise–there are actually servers involved with serverless computing. They just aren’t managed by the organization. A serverless computing model means your cloud provider takes care of adding, removing, and/or adjusting your server resources based upon demand. You end up with a more …

Get started now. Exceptional service awaits.

Live Chat