Tag Archives: cyber security

What is Heartbleed and How Does it Affect Me?

StorageCraft corporate logo

Heartbleed is a security bug in the OpenSSL cryptography library. This bug allows a webserver to reply to a malformed heartbeat request with up to 64 kilobytes of data stored in memory on the webserver. What does this mean for users of StorageCraft products?

Topics: , , ,

Metadata and the Great Privacy Debate

how revealing is metadata

Metadata can be created in a wide variety of ways, across a broad range of mediums, but what you really might need to be concerned about is what it says about you.

Topics: , ,

You Want Cloud Security? Here Are Nine Ways StorageCraft Cloud Services Has You Covered

secure cloud computing

When you use StorageCraft Cloud Services for offsite backup, you can rest assured that we’ll be using the highest-caliber security measures available. Let’s take a look at nine things we do to keep things safe and secure.

Topics: , , ,

Are Tech-Savvier Employees Less Secure?

tech-savvy employees and passwords

Ever get so comfortable doing something that you end up cutting corners? That’s what Mike Kane says is happening to your tech-savvier employees when they are accessing cloud applications.

Topics: , , , ,

Half of IT Security Issues are Caused by Human Error– How Do We Fix This?

employees and cyber security

One of the biggest threats to IT security isn’t hackers, it’s employees. What can a company do to make employees more aware of IT security at work?

Topics: , , ,

2013 Data Breaches You Didn’t Hear About

data breach and cyber-security

You have probably heard of the big data breaches of 2013 – Adobe, LinkedIn, Facebook, Target and Snapchat– but lets take a look at the ones you might not know about.

Topics: , , , ,

CPU Sounds Allow Cyber-Security Crack Potential

acoustic cyber-hacking

The actual sounds made by a computer CPU allowed researchers to break one of the world’s most secure encryption algorithms — 4096-bit RSA.

Topics: , , ,

BYOD: How MSPs Can Make It All Come Together

how MSPs build an effective network with BYOD

Bring your own device (BYOD) is quickly becoming a staple for businesses, but how does an MSP support an environment that contains three or more mobile operating systems?

Topics: , , , ,

Cyber-Security: Five Ways Clients Jeopardize It and Five Ways MSPs Can Educate Them

MSPs and cyber security

  As a managed service provider, one of your main responsibilities is protecting clients from security threats. Cyber-security breaches are a way of…

Topics: , , ,

Worried About Cryptolocker? Put Your Fears Aside with ShadowProtect Backups

protecting yourself from Cryptolocker

For a business that’s protected with proper backups, issues like Cryptolocker don’t always cause a big problem. Even if the malicious software makes it onto a workstation, it’s easy to restore to a point-in-time image of when the computer was clean.

Topics: , , , ,

Cyber-Security — Differences Between the Enterprise and the SMB

cyber security SMB vs. Enterprise

With small to medium sized companies now able to leverage enterprise-level information technology through the use of Cloud-based SaaS, IaaS, and PaaS offerings, are their approaches to information security any different than their larger enterprise brothers?

Topics: , , , ,

Five Lessons In Cyber Security on the Heels of Big Adobe Breach

cyber security

While Adobe is trying to figure out where it all went wrong, spectators are trying to access the level of damage and what it come mean for the company moving forward. For now, we’re going to focus on the lessons that can be learned from another crisis in cyber security.

Topics: , , , ,

A Cyber Security Plan needs to Account for Watering Hole Attacks


SMBs have no valid reason to skimp on their cyber security investment, especially when a new type of threat called a “watering hole” attack places these smaller firms squarely in the target of hackers and other nefarious internet activity.

Topics: ,

Your Cyber Security Strategy is No Match for the NSA, According to New Leaks


If you’ve been keeping up with the IT news cycle, you know that the NSA may very well be the biggest threat to your informational assets. Yep. The gang at America’s number one spy agency are at it again, and this time, they’ve cooked up schemes to circumvent your cyber security technology.


Five Quick Ways to Assess and Fix Cyber Security Issues

five quick cyber-security tips

Cyber security is often put to the side until it comes down to really needing it. There are a few simple things you can do right now to improve your security, are you doing them?


Can Hackers Actually Help with Cyber Security?

protecting cyber security

Hackers are often depicted as the enemies of cyber security, but is that always the case?

Topics: ,

How and why I kicked the addiction to writing down passwords

is your password safe?

Sometimes we need refresher lesson. It might seem obvious to many there are some good reasons not to write down your passwords.


Backup Your Business: Anti-Virus Software and Beyond

planning your backups

Most businesses can forecast how their sales will be months and even years into the future. However, the most savvy business person cannot predict when…

Topics: , ,

Three Scary Real Internet Concerns Your Business Can’t Afford to Ignore

the Internet can be a frightening place

What’s the most awesome invention of all times? For me and several other people, I’m sure, it’s the internet hands down. But is there a darker side?

Topics: , ,

Enhance Your Cyber Security with Image-based Backups

enhancing your cyber security

Computers are vulnerable pieces of equipment, often subjected to hardware failure, overheating, and the potential loss of data. To make matters worse,…

Topics: ,

How to Keep Documents Secure and Accessible on Your Smartphone

A large vault at a bank

Your phone is a good place to put client documents you might need in emergencies, just make sure you try these apps for keeping everything safe and secure.

Topics: , ,

The NSA Has the World’s Largest Backup Hard Drive

Photo of a satellite

The NSA has stirred a lot of controversy recently, but as uncool as sacrificing privacy is, the NSA sure can build one awesome network. The Bluffdale data center is interesting because it doesn’t house unique data—it houses backup data, and in fact, no one NSA data center has unique data…

Topics: , , ,

Personal Security Concerns Rise Tenfold in the Wake of NSA Data Mining Scandal

Photo of a padlock

The recent NSA scandal may leave Americans to wonder if there’s really anyway to have fully private communications. There are a few things you can do.

Topics: ,

Three Things That Make MSP Security a Headache and How To Fix Them


There are three issues that really make security a pain for MSPs. Here’s a look at what they are, and how you can fix them.

Topics: ,

Six Tips for Securing Your Android Phone

image of Google's Android figure

Since it’s so important to secure your computer, and since your phone is a computer, it’s important to make your phone as secure as you would any other computer. Here are six tips to get your Android phone secured.

Topics: ,