Computerworld ran a thoughtful article about several organizations that have moved some and/or most of their applications into the cloud.[1] These groups have enjoyed tremendous savings, reduced internal workloads, and enjoyed faster deployments. As any company considers expanding to the web, it is important to process the opportunities and challenges associated with such a move. […]
Protecting Against SQL Attacks
Businesses have two primary options when building a defense against SQL attacks: prevention and detection. Code can be developed in a way that defeats SQL injection, and developers should take steps when writing code to avoid SQL injection flaws. At the same time, companies use a wide range of 3rd party applications. Avoiding SQL injection […]
Planning for Disasters
How prepared is your business for a hurricane, flooding, power outages, a tornado? According to The Institute for Business & Home Safety an estimated 25% of business never reopen after a major disaster. Those who do reopen may still face such surmounting obstacles that they end up closing. 75% of the companies who fail to […]
Ransomware: What You Need to Know (Part 3)
Best Practices to Combat Ransomware Take a layered approach to security A firewall and Antivirus combination are not enough to secure an environment against ransomware. Layers of protection are an important and in-depth part of your defense. Manage network traffic Proper management of network traffic leads to better control of what traffic is on the […]