Dean Intro – Cloud Technician
Dean Intro – Cloud Technician Hi! I’m Dean. I’m a cloud technician for Beaty Consultancy. I’ve been in the IT business for over 6 years now. I started as IT support for a close to home business, a System Administrator specialising in asset management system hosting as well as other critical infrastructure services. What started […]
Amazon Sidewalk Is Sharing My WiFi! Oh, Wait, No It Isn’t.
Amazon Sidewalk Is Sharing My WiFi! Oh, Wait, No It Isn’t. Many-a-wave was made in the technology press this week by Amazon. It seems our beloved Alexa devices are rising up against us. Alright, that’s overstating it a bit. A lot. But honestly, the way some folks were going on was like they’d managed to […]
Layered Security In The Cloud
Layered Security In The Cloud Security isn’t just one thing, it’s lots of little things. It’s software, and standards and processes within your business. That’s why it’s so hard to just go out to the market and get a company to fix your security. Cloud security can look vastly different from business to business. But […]
Encryption Will Save Us All, Won’t It?
Encryption Will Save Us All, Won’t It? Everyone talk about encryption these days – whether they understand what it is or not. For more information about what encryption is and is not, check out our other Security posts. But is encryption the last word in security? And if so, why don’t we all just switch […]
What Is A Brute Force Attack?
What Is A Brute Force Attack? I bet you wish you could stop reading about all the different ways our cloud platforms can be compromised and breached by the bad-guys. But no, there are loads of attacks we should be aware of in order to keep our businesses safe and secure. So what is a […]
How DNS Poisoning Attacks Work
How DNS Poisoning Attacks Work We love to explore the common security threats which are being leveraged against every cloud platform every day. These threats are never going away, so the best thing to do is understand and guard against them. Let’s find out How DNS Poisoning Attacks Work. What Is DNS DNS stands for […]
Typosquatting – Who Are You Talking To?
Typosquatting – Who Are You Talking To? Typosquatting is where someone else owns a web address, or domain, that looks just like yours. If your customers received an email from your web company, including all of your logos and details, would they notice if it were slightly misspelled? Typosquatting – Who Are You Talking To? […]
MITM – And Why Your Servers Need Protection
MITM – And Why Your Servers Need Protection Man In The Middle, or M-I-T-M attacks are nothing new, but they can still be the cause of huge data breaches. So this week, we’re continuing our investigation into popular hacking techniques by lifting the covers on MITM attacks. MITM – And Why Your Servers Need Protection. […]
SQL Injection And Why Your Servers Need Protection
SQL Injection And Why Your Servers Need Protection We’re continuing our series on specific security concerns and how we protect against them. This week, we’re talking about SQL Injection And Why Your Servers Need Protection. Websites And Databases The vast majority of websites and applications use some kind of back-end database these days. We use […]
What Is DDoS And Why Your Servers Need Protection
What Is DDoS And Why Your Servers Need Protection I blog about security and hacking all the time. Information security is super interesting to me, but also, I need to be on top of the latest cyber security news and happenings so I can help protect our clients. But it’s just as important for everyone […]