If you have been following me for a while, you know that the history of technology is an interest of mine. Here is an infographic from Acronis that covers the history of storage and backup from the punch card to today.
Tuesday, March 31 is World Backup Day. Wednesday April 1st is “I don’t backup day.” It is also April Fool’s Day. Is there a connection?
In the era of crypto-ransomware attacks, backup is considered one of the cornerstones of a good cybersecurity program. Having a automatic backup system, and full set of recent and tested backups is critical for businesses of any size. Current ransomware exploits often will encrypt network attached backup solutions too. Would your current ...Continue Reading →
If you are a small business owner or manager, you have a target on your back. You face a special set of risks from cyber-crime exploits. Most often, you do not have the financial resources to afford a full time IT support employee. You do not have the budget for expensive Intrusion Prevention Systems (IPS), or Security Information and Event Management (SIEM) systems. You might not even have a firewall, ...Continue Reading →
March 31 is World Backup Day. Monday is April Fool’s Day. Coincidence? I think not. I you are one of the hold-outs who is going to get around to it someday, today is your chance.
Google’s Project Zero researchers have revealed a ...Continue Reading →
Sometime around April 3—give or take about a week—China’s 9.5-ton Tiangong-1 space station will fall out of orbit and enter Earth’s atmosphere. While media reports for the last few months have hyped the Continue Reading →
Which means we all get into our cars and spend the day driving in reverse? Not quite. What this means for some of your that today is the day you quit kicking that can down the road and set up a data backup for your systems. Hardware, software, cloud – pick your poison and set it up.
For those of you who are already using a backup solution, today would be ...Continue Reading →
I recently read an article from Heimdal Security about online safety. In this article Heimdal had asked 18 experts in the field of cybersecurity for their top 3 ideas about how to stay secure. The contributors included top cybersecurity professionals from several anti-malware companies, security bloggers, and cybersecurity industry professionals. The original article is here.
What I found interesting were ...Continue Reading →
Thanks to Datarecovery.com, for alerting us to this issue. They have seen a high number RDP (Remote Desktop Protocol) attacks lately. Generally, these attacks are targeting Microsoft Windows-based servers, where port 3389 has been left open.
The attacker scans for open port 3389, and then uses a password dictionary attack to break the server password. Once the password is found, the attacker can exploit the server or sell access to the ...Continue Reading →
Occasionally I will write a book review for this blog, and then set up an Amazon link in a half-hearted attempt at “monetizing” my blog. Let’s just say I haven’t quit my day job just yet.
Here are some great books for coders, and they should be funny for coders and anyone who ever has used a computer program (the rest of us.)
When a smartphone is stolen, it is a disaster. You have just given the keys to your online life, your email, social media accounts, and credit cards you have synced with an app. If you have the new smart locks on your home or office, you also gave them literal keys, the ability to open those locks. If you have live camera ...Continue Reading →