Choosing a strong password is critical to securing your account. Strong and secure passwords can also be a pain, which is why many of us can fall into the bad habit of sharing a password or two across many different accounts. This practice, while helpful in remembering our passwords, makes us more susceptible to attacks on our accounts. (more…)
Traditionally, phishing attacks have targeted consumers with random spam in the hope that that some small proportion of the targets are naive enough to install malicious software or hand over login details. (more…)
Most cloud platforms are as resilient as an old bridge! On December 15, 1967, the Silver Bridge connecting West Virginia to Ohio collapsed during rush hour with horrific results. In the ensuing investigation, the cause was discovered to be the failure of a single supporting member. When the bar failed, the bridge collapsed. In the terminology of bridge engineering, Silver Bridge was “fracture critical”. The failure of a single component caused the failure of the entire system. (more…)
According to a recent report from SIM IT Trends, many enterprise organizations are not doing all they can to protect themselves from online criminals and hackers. Forty-six percent of organizations don’t have a Chief Information Security Officer and only sixty percent of organizations require security training of all staff. (more…)
If I offered you $10 now and $15 next week, which would you choose? Depending on your personality, you might think the obvious choice is to wait until next week and get 50% more money, but studies in psychology have shown that the majority of people take the money and run.
Passwords have proven themselves an inadequate method of authentication many times. It’s not necessarily that the concept is flawed: passwords can be secure if the system around them is implemented properly. But a combination of users’ inability to properly choose and manage passwords and developers’ failure to implement secure systems often leads to security breaches. (more…)
There are three main planks to any secure system: technology, policy, and education. If any one of these is lacking, maintaining data security over the long term is next to impossible. A technological solution is worthless if no one knows how to use it and why it should be used. Even if they do know how to use it, without an enforced policy, it’s entirely likely that employees will take the path of least resistance and greatest convenience. (more…)
Choosing the right hosting option for your project is important. It will help ensure you have a positive experience and only pay for the infrastructure you really need.
But finding exactly the right hosting isn’t easy. There’s an almost infinite variety of options, but many of those options have more to do with marketing than the technical attributes of the platform.
At ServerMania, we offer three basic choices for server hosting:
This October, some the biggest websites and online service providers in the world went offline. Twitter, Reddit, GitHub, AirBNB and a host of other companies were essentially out of business for a few hours.
The culprit: a massive Distributed Denial of Service attack against a key infrastructure provider. (more…)
Side projects are increasingly popular among developers. The availability of inexpensive infrastructure makes launching a web app easier than ever. Any developer with an idea can code a minimal viable product and have it up and running in no time at all. Side projects can be an educational experience, a way to make a few extra dollars, or the beginnings of what may become a full-time job. (more…)