On December 23, a large section of Ukraine went dark. The source wasn’t mechanical failure, nor was it human error. According to Ukrainian officials, it was a cyber-attack, the source of which was reportedly Russia.
To make matters worse, a more recent attack against Kiev’s main airport probably originated from the same source. Read more »
It’s been a few weeks since this year’s consumer electronics show wrapped up. Businesses from all over the tech industry showed up to strut their stuff. Although most of what was showcased was (not surprisingly) consumer tech, it nevertheless spanned industries as diverse as healthcare, automotives, and virtual reality. Read more »
It can get kind of exhausting, trying to keep up with all the data breaches surfacing in the media. It seems like almost every other week, there’s some new crisis in circulation; a new leak, hack, or exploit that puts our personal information at risk. Some are worse than others – a hospital losing a few thousand patient names versus a bank losing hundreds of thousands of financial records, but every breach of private data has the potential to wreak considerable emotional and financial harm on the people concerned.
Today, we’re going to take a look back at some of the worst data breaches we saw this year. Hopefully, as we move forward into 2016, we don’t start seeing incidents that top them (though we probably will). Read more »
Nobody’s perfect. And in the world of network and server administration, mistakes tend to be all-too-common – especially when you’re into your third night of troubleshooting hopped up on enough caffeine to put a Starbucks franchise out of business. Of course, there are some mistakes not even a sleep-deprived, overworked sysadmin will make; novice errors that no one in their right mind would fall victim to.
You haven’t bumbled into any of these, right? Read more »
We live in a world where most operating systems can be navigated with a few clicks, taps, or swipes. To many, Linux seems almost to hail from another century, perhaps even another civilization. Small wonder that even some Linux administrators have trouble keeping all the commands and language they have to use in their day-to-day. Read more »
If you’re a sysadmin, there’s a good chance you fall into one of two camps. Either you feel appreciated and well-liked within your organization, or you believe most people within your business simply see you as a walking band-aid for their technical problems. Unfortunately, as it turns out, there really isn’t a whole lot of middle ground there. Read more »
According to Trend Micro, 2016 will be “the year of online extortion.” Ransomware and extortion tactics targeting users both within enterprise and without will see a sharp increase. Online threats, the report explains, will “evolve to rely more on mastering the psychology behind each scheme than mastering the technical aspects of the operation.” Read more »
So, you want to start using cloud computing in your organization? That’s awesome! Just…keep one thing in mind first, alright? Particularly if you’re building your own cloud, there are certain components and services you need to make sure your business has access to.
Because if it doesn’t, then you simply aren’t up to the challenge of maximizing the benefit the cloud could bring to your business.
The good news is that if you know what you’re doing, it’s not difficult at all to prepare for – and implement – virtually any cloud service model. And that’s where we come in. Today, we’re going to talk about what your business needs to provide in order to be cloud-ready.
Shall we begin? Read more »
When I talk to businesses about their plans for cloud deployment, a frequent response is that they’d love to reap the benefits of the cloud, but that their company’s IT department isn’t organized in a way that makes it possible.
Traditionally, IT departments have been all about stability and availability — it’s their job to keep things running smoothly come what may. Risk aversion is deeply ingrained. While it’s certainly possible to maintain these IT virtues in the cloud, to leverage the cloud to its fullest advantage requires a more flexible, agile approach that may not mesh well with traditional IT. Read more »
According to security firm Sucuri, brute force attacks targeting WordPress have recently seen a sharp increase – and they show no signs of slowing. In the second week of September, they ballooned to 35 million attacks per day – up from 5 million at the beginning of the year. Read more »