Tag Archives: Security

Two-Factor Authentication: Solutions, Methods, Best Practices

With new data breaches being uncovered every week or two, many companies are desperate to improve security for their clients. The old standard of a user login and password is no longer considered very safe, even with a long, complex password and a login that is not simply firstname_lastname@companydomain.com.  

Continue reading

Managing IAM Permissions in the Cloud: AWS vs Microsoft Azure vs Google Cloud

All of the major public clouds offer identity and access management (IAM) tools. The exact nature of the various cloud IAM tools vary, however. So do their names.

As a result, if you are familiar with the IAM solutions available from one public cloud, such as Amazon Web Services (AWS), it can be challenging to understand how IAM tools work on another platform, like Google Cloud or Microsoft Azure.

This article clarifies that issue by comparing the identity and access management tools and frameworks associated with each of the three major public clouds -- AWS, Azure, and Google. It identifies the key IAM-related terms and tools to know for each cloud and explains the approach that each cloud takes to managing user accounts, groups, access control and (where applicable) Active Directory integration. Continue reading

A Few Steps to Windows Server Hardening

Windows Server Hardening Checklist banner

What is server hardening? There are many different ways for a hacker to attack a Windows server, from unpatched system vulnerabilities to misconfigured settings, unnecessary protocols, or vulnerable applications. The process of getting these vulnerabilities closed off or patched (or at least most of them) is server hardening Continue reading

Why Dropbox is Not a Good Choice for Backup Storage

This week everybody is talking about the hacking of Dropbox, the popular online storage service that has over 200 million users and keeps anything from private photos to sensitive documents. Malefactors have stolen almost 70 million account details including email addresses and protected passwords.
Continue reading

AWS Security Best Practices: Checklist

AWS Security Best Practices Checklist

Amazon Web Services ensure data security of in compliance with the so-called Shared Responsibility model. It is based on the following assumption: AWS does such operations like decommissioning of old storage devices in accordance to the latest industry standards and controls physical access to data centers, and the user takes care of securing his root credentials, assigns security groups, edits access control list policies and performs identity management. Therefore, the user takes full responsibility for any security breach on his/her side.

Use this checklist to find out if your account is in compliance with AWS security best practices to protect crucial data and ensure stable work for your resources.
Continue reading

CloudBerry Drive 2.2.2 Now Supports Amazon VPC


As you may know, one of the leaders in the cloud market, Amazon company, offers Amazon Virtual Private Cloud (VPC). It is an isolated AWS segment which represents a virtual network managed by your team. Now it is fully supported by Cloudberry Drive.

Here you will find a brief feature explanation and guidelines on how to connect your Amazon VPC to Cloudberry Drive.

Continue reading

CloudBerry Drive: How to Enable “All Users Mode”

This article refers to CloudBerry Drive 1.4.3 and later.
As always we are trying to make CloudBerry Drive more mature and robust, The newer version of CloudBerry Drive comes an ability to manage mapped drives across all users on a computer.

In previous versions CloudBerry Drive stored mapped drive settings for a particular user by default and then there was an option to share user settings to all but now you can set "all users" mode on install so that all users will initially work with the same settings and be able to manage mapped drives between each other.
Continue reading