Why Your Servers Need Updates
Why Your Servers Need Updates We have spoken about software updates before. However with the imminant end of Windows 7 and Windows Server 2008 updates, we thought it’s worth talking about again. So why does your server need updates? Support Investment To be fair to Microsoft, they have supported these opperating systems for 10 years […]
Why You Need Good Passwords
Why You Need Good Passwords In last week’s blog post, we showed you how to check if your online accounts have been compromised. We’re all told that we should change our passwords regularly, right? That is even more important if one of your online identities has been leaked. So this week, we’re answering the question […]
Security Precautions as a Managed Service Provider
Security Precautions as a Managed Service Provider We talk about security an awful lot here at Beaty Consultancy. We’re a little bit obsessed with it. But isn’t that a good thing? If you’re going to trust us with access to all your data, and data belonging to your clients, shouldn’t we be security draft? I […]
Here’s How To Find Out If Your Data Is At Risk
Here’s How To Find Out If Your Data Is At Risk Most of us are comfortable online nowadays. In fact I’m happier online than I am in a room full of follow humans. Swap the humans for dogs and that switches around again, but you get my point – we all have huge Internet presences […]
Here’s Why You Need a Web Application Firewall
Here’s Why You Need a Web Application Firewall If you’re reading this, the chances are that you run a web application. What do we mean by a web application? Now that websites are so responsive and feature-rich, we’re basically talking about everything on the Internet! WordPress? Web application. Joomla? Moodle? Drupal? Yep, they’re all web […]
Protect your servers from Ransomeware
Protect your servers from Ransomeware We have spoken about cryptocurrency a couple of times before, so by now we know it’s just another foreign currancy that folks can exchange for ‘real’ money. So if the bad guys can make money by using your servers to solve the difficult maths problems which create cryptocurrency, and they […]
Managing your cloud account logins
Managing your cloud account logins We’ve spoken about what cloud is before, so you already know that you’re using cloud technologies everywhere. But when was that last time you checked where you’re signed in to all of those cloud accounts from? When you traded your old mobile, tablet or laptop in, are you sure you […]
Protecting your business from Ransomware
Protecting your business from Ransomware First thing’s first – what is Ransomware? Ransomware is when your data is maliciously encrypted, and a ransom is demanded in order for you to get they keys to unencrypt your data. While your data is in it’s encrypted state, you can’t use it. It might as well have been […]
Encryption in AWS; the Key, the Secret
Encryption in AWS; the Key, the Secret So you read our recent post about encrypting your EBS storage. You have encrypted all your data in transit, and at rest, job done, right? Who owns your encryption keys? Who owns your data secrets? What is Encryption? This isn’t a daft question. I mean, we all know […]
Azure Security Lab: Bug Bounties as a Service?
Azure Security Lab: Bug Bounties as a Service? Beaty Consultancy is regarded within the industry as the guys with the tin hats. We are security nuts. With this time of year seeing lots of security conferences around the word, we get super excited for new services to help aid everyone’s security posture. So when Microsoft […]