Limited-Time Offer | 25% Off Dedicated Servers*Shop Now
Limited-Time Offer | 25% Off Monthly VPS Hosting | Promo Code : LW25Cloud* †††Shop Now
Dedicated Hosting Deals | From $99/moShop Now

AUTHOR

Nick Campbell

Nick is the Senior Director of Security & Compliance at Liquid Web. He has over 20 years of experience in Technology and brings a wealth of knowledge and a strong understanding of data security to help safeguard our customers' environments.

7 Cloud Security Best Practices

For those looking to stay secure from the latest cyber threats, here are the top 7 cloud security best practices you need to follow.
Continue Reading

Virtualization Security: A Comprehensive Overview

Virtualization security ensures that multiple virtual instances of a device running a single physical hardware resource are protected.
Continue Reading

How to Protect Your Business From Ransomware

Ransomware is virtual kidnapping of corporate data in exchange for a sum of money. Your protection from ransomware starts with these 5 steps.
Continue Reading

What are the Implications of Business Continuity for Cloud Computing?

Find out how to maintain business continuity when moving to the cloud, including considerations around support, data, access, and disaster recovery.
Continue Reading

How To Develop a Security Awareness Training Program

Learn how to build a security awareness training from the ground up, including the 4 types of simulated attacks to include in the program.
Continue Reading

Securing Your Infrastructure When Working From Home

Threats that aren't present in an office environment are quite real when working from home. Follow our best practices on remote work cybersecurity.
Continue Reading

How Ransomware is Attacking Healthcare

When it comes to ransomware attacks on hospitals, knowing how to spot phishing or social engineering attacks is your number one safeguard against breach.
Continue Reading

The 6 Considerations for Secure Remote Work

Need to ensure cyber security for teams with remote work? Ask these 6 critical questions to understand whether your remote teams and data are secure.
Continue Reading

A Deep Dive into CryptoLocker Ransomware Malware and How to Protect Yourself

Increase your cybersecurity awareness with analysis of the CryptoLocker ransomware attack, its history, and prevention techniques.
Continue Reading