Tag: Security

Managing IAM Permissions in the Cloud

Managing IAM Permissions in the Cloud

All of the major public clouds offer identity and access management (IAM) tools. The exact nature of the various cloud IAM tools varies, however. So do their names. This article clarifies that issue by comparing the identity and access management tools and frameworks associated with each of the three major public clouds -- AWS, Azure, and Google. Continue reading

Windows Server Hardening Checklist

Windows Server Hardening Checklist

What is server hardening? There are many different ways for a hacker to attack a Windows server, from unpatched system vulnerabilities to misconfigured settings, unnecessary protocols, or vulnerable applications. The process of getting these vulnerabilities closed off or patched (or at least most of them) is server hardening Continue reading

default featured image

Why Dropbox is Not a Good Choice for Backup Storage

Why Dropbox is Not a Good Choice for Backup Storage

This week everybody is talking about the hacking of Dropbox, the popular online storage service that has over 200 million users and keeps anything from private photos to sensitive documents. Malefactors have stolen almost 70 million account details including email addresses and protected passwords.
Continue reading

default featured image

AWS Security Best Practices: Checklist

AWS Security Best Practices: Checklist

AWS Security Best Practices ChecklistAmazon Web Services ensure data security of in compliance with the so-called Shared Responsibility model. It is based on the following assumption: AWS does such operations like decommissioning of old storage devices in accordance to the latest industry standards and controls physical access to data centers, and the user takes care of securing his root credentials, assigns security groups, edits access control list policies and performs identity management. Therefore, the user takes full responsibility for any security breach on his/her side.

Use this checklist to find out if your account is in compliance with AWS security best practices to protect crucial data and ensure stable work for your resources.
Continue reading

default featured image

CloudBerry Drive 2.2.2 Now Supports Amazon VPC

CloudBerry Drive 2.2.2 Now Supports Amazon VPC

Introduction

As you may know, one of the leaders in the cloud market, Amazon company, offers Amazon Virtual Private Cloud (VPC). It is an isolated AWS segment which represents a virtual network managed by your team. Now it is fully supported by Cloudberry Drive.

Here you will find a brief feature explanation and guidelines on how to connect your Amazon VPC to Cloudberry Drive.

Continue reading

default featured image

CloudBerry Drive: How to Enable “All Users Mode”

CloudBerry Drive: How to Enable “All Users Mode”

This article refers to CloudBerry Drive 1.4.3 and later.
As always we are trying to make CloudBerry Drive more mature and robust, The newer version of CloudBerry Drive comes an ability to manage mapped drives across all users on a computer.

In previous versions CloudBerry Drive stored mapped drive settings for a particular user by default and then there was an option to share user settings to all but now you can set "all users" mode on install so that all users will initially work with the same settings and be able to manage mapped drives between each other.
Continue reading

default featured image

How to Backup Data to Amazon S3 With CloudBerry Backup

How to Backup Data to Amazon S3 With CloudBerry Backup

This post explains how to get started with Amazon S3 account and register it with CloudBerry Backup, a powerful solution that allows you to automate your backup/restore process. We hope that this product will become your tool of choice and help you effectively manage your backups and restores. Continue reading