If you use Azure, you know you need to know about the Security Center. Why? One of the biggest challenges (and a major concern for executives) to using the cloud successfully is security, and for good reason. Recent public revelations about data breaches due to poorly configured Amazon S3 buckets are making users think twice before moving to the public cloud. For current Azure users, that risk can be mitigated by properly understanding  how to apply Azure Security Center to your …

What is edge computing?

Posted on January 30, 2018 by

The IoT revolution  is in full swing, bringing with it an army of devices (about 5.6 billion in three years) never before connected to the internet, including thermostats, motion detectors, and automobiles. With all the data that IoT devices generate, the need to process and analyze some of it closer to its creation point has become more important. That need has brought about a new model of cloud computing called Edge Computing. How does this new model change the way …

As we’ve mentioned before, there are three basic components to business continuity: There’s offsite backup, disaster recovery, and data protection as a service (DPaaS). While offsite backup and disaster recovery are the more well known pieces, data protection has an important role, too. Below are a few examples of practical applications of data protection as a service in everyday business: Example A: Company A is a data clearinghouse for the healthcare insurance industry, and needed a better way to handle …

Note: This is a guest post by Sam Youness, who has 20 years of experience history in technical and solutions architecture, engineering, and consulting, with more than 12 of those at Microsoft, specializing implementing the newest technologies for his clients. Sam is also a Microsoft Certified Azure Architect. The Spectre and Meltdown vulnerabilities have shaken the IT industry and left some people wondering about the security of their mission-critical data in a multi-tenant environment. Data hosting is still a viable option …

IT magazine The Register reported that there was a major flaw with Intel, AMD, ARM and POWER chips that affect virtually every single computer ever made in the past 20 years. What a way to bring in the new year, eh? There are two flaws: One is called Spectre, and the other is Meltdown. Meltdown primarily affects Intel and ARM chips, where bad actors can get the CPU to reveal application information from the machine kernel, such as passwords. The good …

We gave Amazon’s S3 storage buckets an honorable mention on our biggest data breaches of 2017 list, and in this post, we’ll explain why we did that. What makes these types of breaches so important to point out? For those who missed it, here’s what happened: AWS users can store their files (known as objects) in what are known as S3 storage buckets. Amazon defaults these S3 buckets to be closed instead of open, but over the course of several …

As we did in 2016, we’re rounding up the biggest data breaches of 2017. What have we learned as a result, and what can companies do better next year? Equifax: The loss of 145 million records may not be the highest in history, but the value of information very well might be. Thanks to an unpatched flaw in an Apache Struts server, names, dates, social security numbers, and more were compromised. Most of the records were American, but about a …

Ransomware predictions for 2018

Posted on December 18, 2017 by

According to cybersecurity firm Bitdefender, ransomware is now estimated to be a $2 billion a year business. At the start of 2016, it was already a billion dollar business, but thanks to WannaCry, NotPetya, and the thousands of other ransomware attacks across the globe, revenues have doubled. What does that mean for ransomware in 2018? Unfortunately, it doesn’t show signs of stopping. Bitdefender says ransomware developers are experimenting with targeting the GPU (Graphics Processing Unit) instead of the CPU (Core Processing …

The Payment Card Industry Data Security Standard (PCI DSS) is required for any organization that processes, stores, or handles transactional financial data. It was first released in 2004, and offers 12 requirements that companies must meet in order to claim PCI compliance. However, just because a company meets the PCI standards once doesn’t mean it’s permanently compliant. So if organizations claim PCI compliance, why is it so hard for them to maintain it? Well, the news is not all bad. …

Two factor authentication is widely recommended as a security practice to give an extra layer of protection to your network and personal accounts, but according to security researchers, if you use SMS texts as your second form of authentication, they could be subject to interception and exploitation. Security researchers demonstrated how easily they were able to manipulate the two-factor set up on a Bitcoin wallet account, simply by intercepting the text message sent over the cellular network. Once they reset …

Get started now. Exceptional service awaits.

Live Chat