Cloud Security 101 – Part 2 – Key Defensive Strategies

Posted by & filed under List Posts.

cloud security -- locked data and devices

<<< Go to Cloud Security 101 – Part 1 – Key Threats Now that we have looked at critical cloud security threats, we examine key defensive measures to protect yourself from them.These recommendations are by no means exhaustive but represent top points of focus. Secure your client devices. You want to implement firewalls to protect… Read more »

Cloud Security 101 – Part 1 – Key Threats

Posted by & filed under List Posts.

cloud security threats and defenses

Go to Cloud Security 101 – Part 2 – Key Defensive Strategies >>> There are general changes in cloud computing that are of interest, but security is such a fundamental concern for online business that it deserves its own attention. This two-part Cloud Security 101 piece looks essentially at the problem and the solution, answering… Read more »

Why You Need a CDN in 2019

Posted by & filed under List Posts.

Due to the broader use of 4K (aka ultra high-definition) video on social platforms and business websites, along with the higher amount of data being consumed across industries, the content delivery network (CDN) market is growing at a remarkable clip. The compound annual growth rate (CAGR) for the global CDN market was forecast at 32.8%… Read more »

Ecommerce, Meet the GDPR

Posted by & filed under List Posts.

Your company may have already invested substantially in General Data Protection Regulation (GDPR) compliant systems and training for experience in the key global data protection law from the European Union (which went into effect in May)… or it may still be on your organization’s to-do list. While the GDPR is certainly being discussed with great… Read more »

The DDoS Landscape After Mirai & DerpTrolling

Posted by & filed under List Posts.

DDoS attacks

Distributed denial of service (DDoS) is one of the biggest security threats facing the Internet. We can develop a false sense of security when we see the major takedowns of individuals such as Austin Thompson – aka DerpTrolling – and Mirai botnet operator Paras Jha. (Jha was recently sentenced, and Thompson just pleaded guilty.) Despite… Read more »

Domain vs. Organization vs. Extended Validation SSL Certificates

Posted by & filed under List Posts.

Green indicator in address bar -- EV

While a secure sockets layer (SSL) certificate may seem to be a piece of paper, it is actually a file connecting its holder with a public key that allows for cryptographic data exchange. Recognized industry-wide as a standard security component, SSL use is also a ranking factor that assists with search engine optimization (SEO). The… Read more »

How Does Big Data Have Business Value?

Posted by & filed under List Posts.

value of big data

Why does big data matter, in a general sense? It gives you a more comprehensive view. It enables you to operate more intelligently and drive better results with your resources by improving your decision-making and getting a stronger grasp of customers and employees alike. Big data may simply seem to be a way to build… Read more »

Managed Data Protection, Powered by Veeam

Posted by & filed under List Posts.

managed data protection for your IT systems

A 2017 report from IDC found that the data protection and recovery software market was not growing as fast as it had in previous years – dropping to a 2.1% compound annual growth rate (CAGR) from a 6.8% CAGR in 2016. There was much more impressive growth among some players though: smaller providers grew at… Read more »

Why Content Delivery Networks?

Posted by & filed under List Posts.

content distribution network

A content delivery network is designed to send video, images, JavaScript, HTML files, and other content to users through a distributed server network. Generally the two protocols used for CDN delivery are HTTP and HTTPS; however, sometimes other protocols can be useful, as with video. The primary reason CDNs are used is to improve content… Read more »

How DDoS Attacks Have Evolved

Posted by & filed under List Posts.

DDoS history -- distributed denial of service attacks

With the rise of the Internet of Things (IoT), experts have warned that it is incredibly vulnerable from a security perspective – and it has been exploited by DDoS attackers. In September-October 2016, nearly 50,000 connected devices, spread out across 164 nations, were used to achieve traffic as high as 280 Gbps. The attack sent… Read more »