The DDoS Landscape After Mirai & DerpTrolling

Posted by & filed under List Posts.

DDoS attacks

Distributed denial of service (DDoS) is one of the biggest security threats facing the Internet. We can develop a false sense of security when we see the major takedowns of individuals such as Austin Thompson – aka DerpTrolling – and Mirai botnet operator Paras Jha. (Jha was recently sentenced, and Thompson just pleaded guilty.) Despite… Read more »

Domain vs. Organization vs. Extended Validation SSL Certificates

Posted by & filed under List Posts.

Green indicator in address bar -- EV

While a secure sockets layer (SSL) certificate may seem to be a piece of paper, it is actually a file connecting its holder with a public key that allows for cryptographic data exchange. Recognized industry-wide as a standard security component, SSL use is also a ranking factor that assists with search engine optimization (SEO). The… Read more »

How Does Big Data Have Business Value?

Posted by & filed under List Posts.

value of big data

Why does big data matter, in a general sense? It gives you a more comprehensive view. It enables you to operate more intelligently and drive better results with your resources by improving your decision-making and getting a stronger grasp of customers and employees alike. Big data may simply seem to be a way to build… Read more »

Managed Data Protection, Powered by Veeam

Posted by & filed under List Posts.

managed data protection for your IT systems

A 2017 report from IDC found that the data protection and recovery software market was not growing as fast as it had in previous years – dropping to a 2.1% compound annual growth rate (CAGR) from a 6.8% CAGR in 2016. There was much more impressive growth among some players though: smaller providers grew at… Read more »

Why Content Delivery Networks?

Posted by & filed under List Posts.

content distribution network

A content delivery network is designed to send video, images, JavaScript, HTML files, and other content to users through a distributed server network. Generally the two protocols used for CDN delivery are HTTP and HTTPS; however, sometimes other protocols can be useful, as with video. The primary reason CDNs are used is to improve content… Read more »

How DDoS Attacks Have Evolved

Posted by & filed under List Posts.

DDoS history -- distributed denial of service attacks

With the rise of the Internet of Things (IoT), experts have warned that it is incredibly vulnerable from a security perspective – and it has been exploited by DDoS attackers. In September-October 2016, nearly 50,000 connected devices, spread out across 164 nations, were used to achieve traffic as high as 280 Gbps. The attack sent… Read more »

What are the Ethics of Ecommerce?

Posted by & filed under List Posts.

Ecommerce ethics attempt to describe fair and just behavior by online merchants. (Yellow ethics sign)

A Tesla investor sued Elon Musk in early August, saying that they believed his claim on Twitter that he had funding solidified to turn the publicly traded company private was fraudulent. This story is still in development and certainly Musk has not (at least at this point) been found guilty of any wrongdoing. The investor,… Read more »

The ROI of Information Security

Posted by & filed under List Posts.

ROSI - the return on security investment. Fingerprint on keyboard - assessment of solutions

People often talk about security in terms of defenses and caution – an emergency system to prevent worse-case scenarios. However, thinking in terms of defense and prevention can distract us from a fundamental truth: security is powerful. It has an incredible amount of value to organizations across all sectors and markets. Establishing the ROI of… Read more »

WordPress Security Best Practices for 2018

Posted by & filed under List Posts.

Lock against code - WordPress security steps to take in 2018

Statistics garnered from analysis of tens of thousands of WordPress sites within the Alexa top 1 million suggest why hackers often choose WordPress to attack. Incredibly, the study from WP WhiteSecurity found that 70% of installations are vulnerable to hacking. The researchers looked at the WordPress installation status and behavior of these WordPress sites in… Read more »

Why Security is a Top Priority for Ecommerce

Posted by & filed under List Posts.

With growth of malware and ransomware, security is a top priority.

It is easy to develop blind spots in our thinking, particularly toward things that we see often, as if they become invisible to us after so much repetition. For instance, we may read so much about cyberattacks and how important security is that it may make it more difficult to logically consider the topic and… Read more »