cloud based security solutions

Top 5 Cloud based Security Solutions

In one of my earlier articles, I had covered one of the basic questions that comes to mind when thinking of moving to the Cloud – how secure is cloud storage? And I figured out despite the myths surrounding it, the cloud is as secure as any online service can be. However, there are always malicious entities on the lookout for attacking a vulnerability. One can minimise such a situation, by employing some cloud based security solutions. In this article, I’ll be covering the reasons to choose Cloud based security for your firm and the top cloud security solutions. Why […]

Read More

Data Privacy: Reality or a Myth

Data Privacy: Reality or a Myth

Consider, you are chatting with your friends on Whatsapp. The discussion on the group is about a vacation resort and, you guys decide to go to ‘Resort X’. However, at that instant, you decide to check out that place by Googling it. Lo and behold! You type the first alphabet and Google suggests you the resort you’ve just finalized. Coincidence is it? Or is there something more? In today’s day and age, with the advancement of technology and easy access to data and portable devices, everyone can be found browsing the internet for the smallest of things. It is due […]

Read More

network security tools

Network Security Tools Every IT Pro Should Rely Upon

Cybercrime is on the rise today so it’s not surprising that IT professionals are so concerned. These crimes are costing a lot of money – both in problems caused and in solving the crimes or even preventing them all together. Fortunately, once you understand this cost you can also find some free and inexpensive tools that will protect your business. It’s a complex situation that must be addressed from every side of the issue. Why Cybercrime is on the Rise Many people are quite surprised to learn just how extensive cybercrime really is, especially since it’s a relatively new issue. […]

Read More

facebook data leak

Facebook’s Data Leak: How It Affects Users

In the days of yore, we heard about the natural calamities – floods, storms, earthquakes. Experts and governments used to discuss ways to contain them and take measures to make good the losses faced. With the advent of the 21st century, the world was introduced to the ‘Internet’, which has gone down in the annals of the human history. However, along with all its blessings, the internet also brought along its issues, with privacy invasion and data breaches topping the list. And this is exactly what is haunting one of the biggest beneficiaries of the internet – Facebook. Facebook started […]

Read More

Decoding the Intel Chip Vulnerabilities: Meltdown and Spectre

Security has always been of utmost concern when it comes to users and their data. Be it web pros, resellers or the customers, all of us use computers, servers and mobile phones in some form or the other. All of these devices work with an inbuilt processor. In this post, we’ll decode the confusion and commotion that has left the IT industry in a disarray with recent security vulnerabilities, that was found to affect Intel and other modern chips as well. What is Intel Chip Vulnerability? The Intel Chip Vulnerability is a flaw that could allow any hacker to steal […]

Read More

Do I need Domain Privacy Protection

When you purchase a domain name, there are several add-on features that you can choose to purchase along with your domain. Some features are useful to everyone while some may only be relevant only to a certain set of users. Many-a-time when we realize a service is an add-on we assume that it might not be worthwhile – it is healthy to be wary of unnecessary up-sells, of course, but it is also a good practice to validate the need for a product that is easily available and may add value to you. One add-on that for domain names (on […]

Read More

How to use OpenSSH on Linux

What is OpenSSH? OpenSSH is a suite based on SSH (Secure Shell) protocol providing a secure network for services like remote login or remote file transfer. OpenSSH is also known as OpenBSD Secure Shell and was initially developed as a part of OpenBSD operating system. What are the features of OpenSSH? OpenSSH is freely available for everyone, their code encourages reusing and auditing of the code. OpenSSH has a secure tunnel to forward remote TCP ports through strong encryption (3DES, Blowfish, AES, Arcfour). An ad hoc SOCKS (Secure Sockets) proxy server can be created using OpenSSH. OpenSSH provides secure communication. […]

Read More

How to install ClamAV on Linux?

Are you a pro user of Linux, probably Dedicated Servers or Virtual Private Servers? If yes, then I’m sure the security of your web hosting is a concern that you cannot take lightly. Viruses, worms and other malicious entities are always evolving to beat the latest defences that system architects and security companies can devise. Hence, it is a good practice to be prepared and ClamAV antivirus is the best choice, with it being available on our cPanel Servers. What is ClamAV? ClamAV is an open source antivirus software used as a web and mail scanner protecting the computer from […]

Read More