Recently, an unknown group equipped with a leaked CIA hacking tool launched one of the largest cyber attacks in history – here’s what we’re doing to ensure your security. Several weeks ago, security experts across the world were left aghast at one of the largest ransomware attacks in history. A nasty piece of software called WannaCrypt […]
In the past, it was very clear what you meant when talking about a business’s corporate network. A few servers and PCs, a laptop or two, maybe a VOIP solution, all protected by a firewall. Remote work, where it existed, was relatively rare, and subject to heavy authentication. Then the smartphone was born.
Everything from your first cup of coffee & your commute to the office, to your afternoon snack & evening walk with your dog can now be connected and tracked. This is the kind of world we will soon live in – a world where every device or appliance we use in our day-to-day is connected […]
The distributed denial of service attack is one of the oldest criminal activities on the web, a distinction it shares with ransomware. In spite of its age, however, DDoS attacks have weathered the years surprisingly well .The reason for that is quite simple – even though at its core, every DDoS attack does the same […]
It starts with a bit of unusual traffic – a surge of access requests from seemingly-unrelated IPs. Slowly but surely, your servers are overwhelmed. Your network-facing infrastructure starts slowing down, until it eventually grinds to a halt altogether. With a sinking feeling in the pit of your stomach, you realize what this means. You have […]
Recently, a community site known as Myth Weavers suffered a catastrophic database failure. The site, which stores information for a variety of different board games, is – or perhaps I should say, was – widely-used in the tabletop community. Unfortunately, earlier this month, a routine prune by the site’s administrator went horribly wrong.
There is a great deal that can go wrong with your data. Your servers can be damaged by faulty equipment, a natural disaster, or general wear and tear. A bad update can wipe out critical files in swathes, as can user error. And all of this does not even account for cybercrime, which is a […]
Netflix. Amazon. Twitter. What do these three major corporations all have in common? At one point or another, all three have suffered a cloud outage – one that not even their extensive cloud networks could prevent. As a matter of fact, in most cases, it was a cloud failure that caused the outage in the […]
Employers are, in many situations, required to teach their employees about good data security and data privacy practices – especially in regulated industries. This does not, however, mean that they do so effectively. But they should. A large percentage of corporate data breaches are caused by non-malicious employee errors. They are caused by mistakes which, […]