It was essentially a fat finger on the command line. Everyone in IT has done it at one point in their career.
Back in January I wrote a post on IoT and the year ahead. I suspect the past few weeks’ activities have given IoT somewhat more press than my humble ramblings. Pretty much no one escaped the news that there have been some interesting new variants on the good old fashioned Distributed Denial of Service (DDoS), leveraging weak points in IoT devices around the world.
Headline too strong for you? Well, it was inspired by a couple of conversations this week that took me back in time to 2011 when I first joined Cloudreach, and the business world was a little more suspicious of cloud security.
The advent of new IT environments and cloud adoption has brought about the new challenge of how to defend it from potential threats and malicious use. In this post we’ll offer you some insight into free security scanning tools that will help you to protect your systems, giving some Cloudy advice along the way.
It's Security Awareness Week at Cloudreach, and we're bringing you a special guest blog post from our Partner Alert Logic!
Now there’s a doom mongering headline, eh? Well, it’s true so I make no apology for it. It’s been nearly a year since I last wrote on the subject of security (“How Secure is your data”), but having been to visit our partners Alert Logic recently, I was motivated to jot down a few further thoughts.
Who owns security? Let’s start with a simple question: Who is responsible for security in your business? Not sure? Well, then it could be you…. Sweating yet? Even if it isn’t you, whatever your role, you have a part to play in keeping your business safe.