Tag: Security
Enhance the security of your server by reading through our easy to follow tutorials. From installing firewalls to auto-renewing SSLs, our expansive library is sure to be your bookmark favorite.
We can define the Internet of Things (IoT) as a collection of various hardware and software devices and tools connected on one or multiple networks on the Internet. With an ever-increasing number of connected devices on the IoT networks, ensuring optimal IoT security is vital for tools and businesses to remain functional.
What is Block Storage?
It is essential to know what storage option is right for your business. Whether you are storing your files locally or using off-server storage solutions like object storage or block storage, they all have great features depending on your business needs. To help you choose, we will explore block storage, its basic architecture, and how it functions.
What is an Intrusion Prevention System (IPS)?
Cybersecurity is at the forefront of every conversation for web professionals, agencies, and the companies that host them. User data proves valuable, and attackers are doing everything possible to access it for their gain. As a result, it is increasingly advantageous to detect vulnerabilities and threats and deal with them proactively by implementing an intrusion prevention system (IPS).
What is Observability?
For any company, it’s essential to utilize the most profitable and reliable services for performing different tasks and growing your business. By consuming these software products and services, they receive the latest updates and improvements through new releases via the Internet.
How To Set up an SSH Key for SFTP in SiteWorx
In this tutorial, we’ll describe how to create and set up SSH keys for SFTP connections to remote servers using the Interworx control panel. Siteworx is a part of the Interworx control panel that grants you the ability to monitor bandwidth, disk space, email, database information, and other critical information relating to your hosted websites within the same Unix account.
Liquid Web’s Incident Management Process
Incident Management is the process of managing the lifecycle of all incidents, with the primary objective of returning systems to their working state as quickly as possible. Using ITIL (Information Technology Infrastructure Library) guidelines, Liquid Web developed and follows our own Incident Management Process. This process covers all of our organization’s components, both customer-facing and internal.
How To Set up and Use Active Directory
![Windows Active DIrectory](https://res.cloudinary.com/lwgatsby/f_auto/www/uploads/2021/03/WindowsActiveDIrectory1.png)
Introduction
This article will discuss the importance of Active Directory (AD), along with what it is, what it does, installation, and configuration. We must state in advance that there have been entire books written about AD. While we will touch on the significant aspects of its functionality, more in-depth information can be found online.
Guide to Installing and Configuring Vault
![Vault Logo](https://res.cloudinary.com/lwgatsby/f_auto/www/uploads/2021/03/vault.logo_.png)
What is Vault?
Vault protects and secures access to multiple types of confidential data. It stores and manages sensitive password information, API keys, and access tokens that exist in a low trust environment and generates dynamic access to authenticate users to ensure they have authorized ingress and availability to a file, location, service, or application.
Microsoft Exchange Server Security Update
Introduction
![Microsoft Exchange Security Update](https://res.cloudinary.com/lwgatsby/f_auto/www/uploads/2017/10/Cybersecurity-3.png)
In this article, we provide updated information concerning the ongoing threat posed by the malware directed at Microsoft Exchange Servers noted in CVE-2021-26855. We also furnish the steps needed to update and secure your Microsoft Exchange Server. In a recent post, the Cybersecurity & Infrastructure Security Agency posted a priority security advisory regarding the recent Microsoft Exchange Server vulnerability. They state:
What is SIEM?
![SIEM 2](https://res.cloudinary.com/lwgatsby/f_auto/www/uploads/2021/02/siem.022621.png)
Security Information and Event Management (or SIEM) is a subset of the computer security field, where applications and services join forces with security event management and security information management. When united, these disciplines provide significantly improved real-time statistical data and threat analysis of alerts generated by the related applications. The 2021 Internet Security Threat Report from Sophos denotes that are not only the number of attacks on the rise but also the diverse nature of methodologies and vectors of incursions used. This necessitates the fact that adding a SIEM is especially warranted at this time.
Our Sales and Support teams are available 24 hours by phone or e-mail to assist.