The Difference Between Multi-Cloud and Hybrid Cloud

Posted by Matthew Fall on Apr 2, 2019 6:05:00 AM

As cloud grows in popularity, so are the ways businesses leverage cloud technology to meet business needs. In an earlier blog, we discussed the difference between public, private, and hybrid cloud strategies. Now, a fourth type of cloud strategy, multi-cloud, is growing in popularity. Often people confuse multi-cloud and hybrid cloud. At first glance, they seem similar, both deploying multiple environments. But here some of the distinct differences between multi-cloud and hybrid cloud:

Read More

Topics: Hybrid Cloud, Cloud Security, Cloud Solutions

Top 5 Security Best Practices

Posted by Matthew Fall on Mar 12, 2019 9:39:00 AM

As humans, we are constantly weighing the odds of particular events happening, more specifically we identify the likelihood of negative events happening to us as lesser than them happening to someone else. This “that won’t happen to me” attitude is the main reason why we so often take a reactive approach to security. For example, your house gets broken into. From a reactive standpoint, you call the police, go out and buy a security camera, change the locks on your doors, etc. The proactive approach would suggest that you do all of this before the break-in occurs so that you've implemented the cameras, get that guard dog, and change the locks before an incident even occurs. For security issues that pertain to your business and its data, a reactive approach won’t cut it, and will often result in prolonged downtime and unexpected data loss. With security breaches on the rise, the important thing to realize is that it is no longer a matter of IF you will be affected, but when.  

Read More

Topics: Security as a Service, SECaaS, Cloud Security, cybersecurity

How to Protect Your Business From the Dark Web

Posted by Matthew Fall on Feb 21, 2019 2:00:00 PM

What is the Dark Web? 

The dark web is a part of the internet that isn’t indexed by search engines, like Google or Bing. You can’t access the dark web by using a regular web browser like Chrome, Firefox, or Safari. Instead, the dark web is accessed via special software, like Tor, where users can maintain anonymity (there are no IP addresses) as they surf the dark web and make exchanges.  

Read More

Topics: Security as a Service, Cloud Security, email security

Why Your Business Needs Multi-Factor Authentication

Posted by Matthew Fall on Feb 5, 2019 10:27:00 AM

The average person uses 5 passwords or less across their entire online profile lifetime. That means you most likely have the same password for your personal computer, your bank app, your email account, and dare I say it, your work computer! If you fall into this category or feel that any of your employees might, consider implementing multi-factor authentication on your organization’s end-point devices and network to ensure it stays safe and secure from hackers. 

Read More

Topics: Cloud Security, Password Best Practices, cybersecurity

Why You Need a SIEM Tool

Posted by Matthew Fall on Jan 31, 2019 9:33:00 AM

SIEM- it stands for Security Information & Event Management. SIEM has become a vital part of the security strategy of all growing businesses. By 2021, global spending on SIEM is projected to be at $3.4 billion dollars, and for good reason. We all know the next generation of threats to our society will be waged online, but SIEM is here to help. Breaches are now a matter of when, not if. That’s why the best cyber-security incorporates real-time identification of breeches and instant response using SIEM. 

Read More

Topics: Cloud Security, SIEM

7 Key Considerations When It Comes to Security as a Service (SECaaS)

Posted by Sydney Boman on Jan 16, 2019 8:22:00 AM

In response to the increased sophistication and devastating consequences of cyber attacks, businesses have gradually transitioned their cybersecurity strategy away from on-premise security solutions and Managed Security Service Providers (MSSPs) to the Security-as-a-Service (SECaaS) model. With SECaaS, a third-party cloud provider assumes the responsibility for the development and maintenance of a business' cyber-security strategy. In 2015, the worldwide market for SECaaS was at $3.12 billion. This market size is projected to reach $8.52 billion by 2020, at a Compound Annual Growth Rate (CAGR) of 22.2%.

Read More

Topics: Security as a Service, SECaaS, Cloud Security, cybersecurity

5 Ways to Improve Mobile Device Security

Posted by Matthew Fall on Jan 8, 2019 8:20:00 AM

The modern workforce is becoming increasingly mobile. Mobile devices, tablets, and laptops are becoming more powerful and with the imminent arrival of 5G, the amount of computing power performed on a mobile device will surely explode. According to a 2018 survey by Oxford Economics80% of IT executives believe that mobile devices are vital to enterprise success.  

Read More

Topics: Cloud Security, cybersecurity

The Cost of Cyber-Attacks in Healthcare

Posted by Matthew Fall on Nov 28, 2018 10:07:00 AM

Cybersecurity is top of mind for IT professionals, especially those working in the healthcare industry. The costs associated with a cyber-attack, like ransomware, malware, and other viruses, has increased since 2017. According to a study performed by Ponemon, in 2018 the cost associated with a data breach for the healthcare industry has been $408 per patient record, up from $308 per patient record the previous year 

Read More

Topics: Ransomware, Security as a Service, Security, Cloud Security

How SECaaS can Supplement Office 365 Backups

Posted by Matthew Fall on Nov 15, 2018 9:00:00 AM

Let’s start with Office 365 Backup and Recovery. Most organizations don’t realize that O365 data from Excel, Word, PowerPoint, Outlook and more need to be backed up to the Cloud. From Microsoft Exchange to SharePoint and OneDrive, these files aren’t automatically backed up by Microsoft. Though they are applications accessed via the Cloud, once deleted or lost these files are gone forever unless they had previously been backed up. 

Read More

Topics: SECaaS, Security, Cloud Security

Why Network Audits Should Not Be Overlooked

Posted by Matthew Fall on Nov 13, 2018 10:27:00 AM

Have you tested your network security in the last 3 years? How about within the last year? The last 3 months? It can be argued that network security audits should be performed quarterly at the very least, but the best strategy is having a 24/7/365 network security engineer monitoring your network at all time.  

Read More

Topics: Security as a Service, Security, Cloud Security

Subscribe to our Blog!

DR Guidebook CTA

Recent Posts

Posts by Tag

See all