Is Your MongoDB Secure From Ransom Attacks

Is Your MongoDB Database Secured Against Ransom Attacks?

MongoDB is a popular NoSQL database with a serious problem. Tens of thousands of MongoDB databases have been hacked by criminals, who replace the data with a simple message: “Send us money or your data is gone forever”. In fact, calling it a hack is overly generous, since there’s very little hacking involved: the databases have no protection and are exposed to the internet. (more…)

Cloud Platforms Sturdy As Old Bridge

How To Build a Resilient Cloud-Based Application

Most cloud platforms are as resilient as an old bridge! On December 15, 1967, the Silver Bridge connecting West Virginia to Ohio collapsed during rush hour with horrific results. In the ensuing investigation, the cause was discovered to be the failure of a single supporting member. When the bar failed, the bridge collapsed. In the terminology of bridge engineering, Silver Bridge was “fracture critical”. The failure of a single component caused the failure of the entire system. (more…)

The Psychological Bias That Leads To Poor App and Infrastructure Security

The Psychological Bias That Leads To Poor App and Infrastructure Security

If I offered you $10 now and $15 next week, which would you choose? Depending on your personality, you might think the obvious choice is to wait until next week and get 50% more money, but studies in psychology have shown that the majority of people take the money and run.

The effect is called intertemporal discounting, and it — in part — explains why we so often hear about security breaches which could have been avoided. (more…)

NIST’s New Password Guidance Challenges Some Common Practices

NIST’s New Password Guidance Challenges Some Common Practices

Passwords have proven themselves an inadequate method of authentication many times. It’s not necessarily that the concept is flawed: passwords can be secure if the system around them is implemented properly. But a combination of users’ inability to properly choose and manage passwords and developers’ failure to implement secure systems often leads to security breaches. (more…)

A Data Security Policy Makes Employees Accountable For Keeping Data Safe

A Data Security Policy Makes Employees Accountable For Keeping Data Safe

There are three main planks to any secure system: technology, policy, and education. If any one of these is lacking, maintaining data security over the long term is next to impossible. A technological solution is worthless if no one knows how to use it and why it should be used. Even if they do know how to use it, without an enforced policy, it’s entirely likely that employees will take the path of least resistance and greatest convenience. (more…)

Hybrid Server, Dedicated Server, Or Cloud

Hybrid Server, Dedicated Server, Or Cloud: Which Is Right For Your Project?

Choosing the right hosting option for your project is important. It will help ensure you have a positive experience and only pay for the infrastructure you really need.

But finding exactly the right hosting isn’t easy. There’s an almost infinite variety of options, but many of those options have more to do with marketing than the technical attributes of the platform.

At ServerMania, we offer three basic choices for server hosting:

(more…)