Data leaks and ransomware infections are common threats nowadays, which you can avoid by using data encryption technologies. If no one can read your data, you do not need to be too afraid of its theft.
That is why it is becoming more popular to encrypt system drives. In this article, we are going to overview the BitLocker tool and a few of its alternatives. Continue reading
What is server hardening? There are many different ways for a hacker to attack a Windows server, from unpatched system vulnerabilities to misconfigured settings, unnecessary protocols, or vulnerable applications. The process of getting these vulnerabilities closed off or patched (or at least most of them) is server hardening Continue reading
You can never know when a disaster will occur to your cloud infrastructure. You can, however, prepare a cloud disaster recovery plan that enables you to restore operations quickly whenever disaster does strike your cloud. This article explains how. Continue reading
Choosing between NAS or iSCSI SAN is one of the cornerstones of modern data centers. The times when NAS was ridiculously slow to be used as a backend storage are gone. Now the choice is not so easy, so we are going to explain the main differences between NAS and iSCSI storage. Continue reading
What Is Spear Phishing?
Spear phishing attacks are executed through the use of electronic or email communications. Targeted phishing may impact an individual, corporation or business, depending upon the objectives and intentions of its perpetrators. Cybercriminals may launch spear phishing attacks for the following reasons: Continue reading
A SAN is a key piece of technology in data storage in several types of infrastructure, but there are varying implementations and standards on the market. In this article, we are going to review the key differences between FC, FCoE and iSCSI in order to help you choose the best option. Continue reading
Where can you find cloud certifications? If you choose to get a cloud certification, should you obtain one from a certain cloud vendor -- such as AWS, Azure or Google -- or should you pursue a general-purpose cloud certification? Which categories of cloud computing certifications are available currently?
Those are all important questions for IT professionals to ask themselves in the present age of cloud-native everything. Keep reading for an overview of the main cloud computing certifications available today. Continue reading
OS hardening is a critical best practice in an age when cybersecurity attacks are steadily increasing in frequency.
But is OS hardening sufficient on its own to keep data safe from attackers? The short answer is no. For the long answer, and an explanation of where OS hardening fits within an overall data security strategy, keep reading. Continue reading
Backing up of cloud-based emails might not seem necessary, but it allows you to protect the data in case of any disaster, and it also allows you to meet compliance requirements. That is why we are going to overview how to backup Google Apps email using different options, including built-in tools and third-party integration mechanisms. Continue reading
Google G Suite (formerly known as “Google Apps”) contains a broad range of everyday business tools, allowing you to move most of your activities to the cloud. In this article, we are going to overview G Suite basic backup practices and answer the question “Do you ever need to make a backup of cloud-based data?” Continue reading