-
Recent Posts
Recent Comments
Archives
- September 2019
- August 2019
- July 2019
- June 2019
- May 2019
- April 2019
- March 2019
- February 2019
- January 2019
- December 2018
- November 2018
- October 2018
- September 2018
- August 2018
- July 2018
- June 2018
- May 2018
- April 2018
- March 2018
- February 2018
- January 2018
- December 2017
- November 2017
- October 2017
- September 2017
- August 2017
- July 2017
- June 2017
- May 2017
- April 2017
- March 2017
- February 2017
- January 2017
- December 2016
- November 2016
- October 2016
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- February 2016
- January 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- May 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- September 2013
- August 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- February 2013
- January 2013
- December 2012
- November 2012
- October 2012
- September 2012
- August 2012
- July 2012
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- August 2011
- July 2011
- March 2011
- November 2010
Categories
Meta
Monthly Archives: January 2014
ICANN Delegates More than 100 New gTLDs to Root Zone
This week ICANN announced that more than 100 new gTLDs have been delegated into the DNS root zone, one of the final steps before registries can begin accepting registrations for new gTLDs. Continue reading
EU Committee Votes for ‘Telecoms Single Market’ and Net Neutrality
The European Parliament’s Committee on the Internal Market and Consumer Rights (IMCO) voted Thursday for a proposal for a “Telecoms Single Market” that would eliminate many of the cross-border barriers to internet and mobile communication – and enforce net neutrality. Continue reading
Posted in HostGator, Hosting, VodaHost
Tagged committee, cross, european-parliament, internal-market, mobile-communication, telecoms-single, thursday, web hosting
Leave a comment
Cybercrime: How To Keep Your Business Information Safe
The post Cybercrime: How To Keep Your Business Information Safe appeared first on HostGator Web Hosting Blog | Gator Crossing . As a business owner, the threat of intentional harm to your business-critical data is of great concern. With opportunistic cyber criminals profiting from the vulnerability of unsecured companies every day, making security a priority is simple dollars and cents. Fortunately, strong, time-tested security practices and a little education can help keep your business from becoming a victim. Here’s how to turn your screen door network into a bank vault of data integrity. Establish Secure Device Practices Begin by shoring up your infrastructure. For a modern business, this can involve an array of hardware and mobile devices, each of which represents a potential liability for your network security. Computers located at your workplace should follow rudimentary security protocols both online and off. Employees should lock their computers when stepping away, even for a moment. In addition, attention should be paid to what external parties enter the workplace, when, and for how long. Anti-virus and anti-malware software should be installed and kept current on all computers and all software installed on the machines should be kept up to date as well. In addition, all banking performed by the business should be performed exclusively on one machine with no other activity on said machine permitted. Social networking, email, and downloading open specific machines up to security vulnerabilities, and when finances are conducted on a machine possessing such vulnerability, the consequences can be dire. If your company does work on mobile phones, additional accommodations should be made for them as well. Make sure that all wireless connections within the company are encrypted and secured. Whether provided or owned, employee phones should possess a passcode that changes on a regular basis, with the option selected to wipe the phone after a number of unsuccessful inputs. If your company provides mobile devices, install security software that allows for remote wiping, just to be sure. Establish Secure Online Practices With your machines secure, the activities conducted on them must be as well. This is true particularly for business activities, but improving the security of employees’ personal browsing habits will also improve security. Institute secure access protocols that will build a strong barrier between hackers and your critical information. Require that employee passwords change on a regular basis, generally 60 to 90 days, be of a considerable length, and contain a diverse range of characters (numbers, capitals, and symbols). For businesses running email through Google’s platform, two-factor authentication can be enabled that requires a code from a mobile application. This functionality adds an additional layer to your efforts that password cracking programs can’t breach. Exercise caution when utilizing cloud services, despite their convenience. Data sent over unencrypted channels is a prime target for hackers, and the major cloud services, including DropBox and iCloud, have been compromised multiple times in the recent past. If your business must use cloud services, thoroughly investigate the security protocols of your vendor or leverage your business’ IT department to build a solution in-house. Educate Your Staff Top-down implementation of security protocols will help build an enforcement structure, but getting employees to actually act on established policies requires training. While many threats can be lessened through automation and device policies, the real vulnerability of your critical data lies with uneducated personnel. Explaining your policies to your staff will help them understand the need for such strict enforcement. Your training should include sections on password policies, email practices, and data flows so that they understand what makes them so vulnerable. In addition, it your staff should be enlisted to help identify intrusions and report potential vulnerabilities. Your training should also include a comprehensive conversation about email phishing. While hackers do attempt to pick the digital locks of secure systems, the most efficacious form of intrusion is through elicit software installed through user admission. Inform them regarding what a trusted email/email address looks like and how to spot a fake. Encourage them to avoid downloading or installing anything unless the identity of the publisher is known. Remind them that they’re as much apart of your security system as the software and hardware you use, and that responsible browsing is an essential part of keeping critical information secure. Invest In Failsafes While you can certainly do your best to batten down the hatches, intrusions do occur. Whether through a new method of phishing or more sophisticated network intrusion technology, your business must be prepared to deal with the consequences when they occur. Proprietary information is essential to the competitive advantage of your business so whether its stolen or lost, maintaining it is the key. Invest in localized and third-party backup systems in order to redundantly store all important information. Make sure that your third-party provider has sound security and encryption protocols as well, so that an intrusion into their system does not compromise your information integrity. To fully cover your bases, invest in data insurance. Policies exist that can help cover damages in cases of cybercrime and, even if you can’t get your data back, the compensation for your crisis will provide necessary resources to reboot and rebuild. Data security has become as essential to business operations as sales. Your information is your livelihood, and employing the right policies and protocols will help guard your precious assets from compromise. Build your infrastructure around secure usage and implement software and browsing policies that eliminate potential vulnerability. Train your staff to become a security asset and invest in backups in case things go totally awry. Guard your intellectual capital and your financial data, and your firm can feel safer conducting business as usual. For more information on how to keep your business safe and secure, explore these additional resources . web hosting Continue reading
Posted in HostGator, Hosting, php, VodaHost, vps
Tagged advertising, brent-oxley, dedicated-servers, events, facebook, gator politics, hostgator, vps, vps-hosting
Leave a comment
Government Requests for Verizon User Data Increased in 2013: Transparency Report
Verizon provided user data to government agencies 321,545 times in 2013, according to its first transparency report. The report was released earlier this week to fulfill a promise made by the telecom giant in the wake of the NSA leaks which created a storm of controversy around data privacy in the US. Continue reading
Posted in HostGator, Hosting, VodaHost
Tagged around-data, government-agencies, its-first, promise-made, released-earlier, telecom, the-telecom, the-wake, wake, web hosting, week
Leave a comment
This Year’s First WHIR Event in Sunny Scottsdale, AZ
?Last night we hosted the first WHIR networking event of the year in Scottsdale, Arizona. More than 100 local hosting industry professionals joined us for the launch of our sixth year hosting these fun and noteworthy local events. Continue reading
Posted in HostGator, Hosting, VodaHost
Tagged hosted-the-first, hosting, local-hosting, networking-event, our-sixth, the-year, web hosting
Leave a comment