Archive

Tools and Standards for Email Scam Mitigation

You put server infrastructure in place to operate in today’s online world. You upgrade your server concept to colocation with a service like Global IP Networks in order to have access to more capacity and a higher standard than you have the IT department or budget to manage on your own. That addresses server availability, but that’s only one step in securing your IT infrastructure. Your domain also must avoid the reputation as a conduit for spam or scam emails. Global IP Networks helps with that. We do not host pornography, gambling or other high risk sites which can be security concerns and…

Read more

SANS Policy Templates: Digital Signature Acceptance Policy

The SANS Institute has published several information security policy templates describing best data security practices in template format. This largely means that you can ‘fill in the blanks’ when developing a security policy (although some modification will be in order for your specific circumstances). In this post we’ll look at the SANS template for digital signature acceptance as part of email and network security. In this SANS policy template, purpose and scope are very important. External customers sign for products and services, and these signing mechanisms have a variety of rapidly changing requirements and standards. The SANS digital signature policy explicitly does not…

Read more

SANS Policy Templates: Clean Desk Policy

The SANS Institute has published several information security policy templates describing best data security practices in template format. This largely means that you can ‘fill in the blanks’ when developing a security policy (although some modification will be in order for your specific circumstances). In this post we’ll look at the SANS template for developing a clean desk policy as a part of overall network security. A clean desk policy largely revolves around keeping company information confidential. This may be, but is not limited to customer information. Certainly there are examples of both customer and non-customer information becoming public which would,…

Read more

Five Factors to Look for When Using Cloud Computing for Your Business

We all know the value of cloud computing. It enables you to have a valid backup system that can be accessed any time so that, if your land-based system is temporarily down, it will still function as a service. It is convenient and automatic and takes much of the worry out of how to handle unforeseen disasters. However, how do you keep your data safe and know that you have a secure backup system? How do you know your cloud system is secure? What else do you need to ensure things will run smoothly in the event of downtime? Here is…

Read more

Cloud Computing: Denial of Service Attacks

In a cloud computing environment, attacks on shared resources can compromise your cloud solution. It is important to have security in place for when your systems may become compromised. Additionally, managed services such as monitering can avoid many types of attacks. A Denial of Service (DOS Attack) causes increased loads on your servers and network that result in an overload and/or a failure. If a failure does not occur, response time will degrade and become unacceptable. You will lose the consumer to another web site. This ultimately will cost you money as your online presence will be down. For example, two cloud…

Read more

Brute Force Hacking: Are Your Servers Safe?

Hollywood often portrays the hacker as an individual who is highly adept at guessing usernames and passwords. In the real world, servers actually do get hacked in this way. However, the guessing isn’t done by a person but rather by software. The software sometimes does this systematically by using all possible combinations of characters to guess usernames and passwords. Sometimes they may use to great effect, a list of default usernames and passwords commonly used by lazy people. Because of the software’s speed and the prevalence of weak usernames and passwords, the hacker has a good chance of success. Even when an…

Read more