3 simple ways to protect your AWS account

cloud securityThe head of global security programs for Amazon Web Services (AWS) recently said the biggest fear at AWS wasn’t a malicious attack or harmful coding, but a customer’s inadequate security protocols. Amazon stands by its security of a customer’s data at rest, but takes no action to prevent a user from maliciously – or accidentally – deleting any resources on an account.

AWS follows a shared responsibility model for its security — Amazon manages the security of the underlying infrastructure while customers control what security they administer in their AWS account. Yet some customers simply aren’t doing enough to safeguard their AWS assets. Even more bewildering, the tools and best practices available to increase the level of protection are incredibly easy and quick to implement.

Here are three simple things you can do to make sure your AWS account is better protected: Continue Reading…

Tags: , ,

The biggest security mistake you can make (and how to avoid it)

biggest security mistakeNo organization is immune to security risks. Between malware, viruses, network attacks, and data breaches, organizations must keep a watchful eye on the health of their IT environment.

But often the biggest security risk is the one you’re not paying attention to. It’s not forgetting to patch security vulnerabilities, or not running antivirus, or relying on outdated software. Those are bad ideas, for sure, but there is one idea that’s worse than all of those combined: Not conducting regular data backups.

Organizations that don’t follow through with regular data backups aren’t alone, and a proper system backup solution doesn’t have to be a budget-busting endeavor. IT can easily fill this security gap with the right support. Continue Reading…

Tags: , , , , , ,

You’re overdue for a data protection checkup

Stethoscope-on-KeyboardData is among the most valuable assets for any organization. And collecting, storing, and securing internal and external information only grows more important as the amount of data flooding in continues to rise.

Securing that data from hardware failure, natural disaster, malicious activity, or erroneous deletion can be challenging, especially if your data protection systems and processes aren’t functioning at their highest level. Given the speed with which data stores grow every day, it’s important to periodically audit and reassess your current data protection systems and determine whether an upgrade, refresh, or consolidation could better assist your organization in guarding your content.

Here are the four areas to review when evaluating your data protection solution. Continue Reading…

Tags: , , , ,