This Week in Data (May 22, 2015)

Posted by Ben Barker on May 22, 2015 2:21:49 PM

 Satellite-this-week-in-data-may-22

"This Week in Data" is a weekly infographic that aims to serve as a quick and easy way for our readers to catch up on the latest news about the people and organizations that are shaking up the world of big data, cloud computing, and all things data storage.

This week the LogJam vulnerability is compromising connections between users and servers while vulnerabilities in UC Browser are allowing spy agencies to collect personal information. Additionally, a recent study shows that half of all retail and health care websites were vulnerable in 2014. 

Want to get the rest of the story? Check below for the headlines in our weekly infographic, and you can find the links for each story further down on the page.

Read More

Topics: TWID

Is the New Venom Virtualization Vulnerability Deadly to Data Centers?

Posted by Mary McCoy on May 21, 2015 6:00:00 AM

Last Wednesday, news broke about a new zero-day vulnerability that has the web hosting community hissing. Originally discovered by security firm CrowdStrike, VENOM - or Virtualized Environment Neglected Operations Manipulation - is a buffer bug that lives in the virtual floppy drive code of the open source QEMU platform that could potentially allow hackers to compromise entire data centers by gaining access to virtual instances on the hosts within.

Just how serious is this CVE-2015-3456 security concern? Which computer virtualization platforms have been affected and which have released patches? Almost a week after detecting this flaw, are we right to equate its impact with Heartbleed or should we shed that comparison like an old layer of skin? Learn more about the VENOM virtualization vulnerability, how hackers can exploit it to gain access to virtual machines and what web hosts can do to mitigate the damage!

Read More

Topics: data protection, hosting, data loss, Industry News, security

This Week in Data (May 15, 2015)

Posted by Ben Austin on May 15, 2015 6:30:00 AM

"This Week in Data" is a weekly infographic that aims to serve as a quick and easy way for our readers to catch up on the latest news about the people and organizations that are shaking up the world of big data, cloud computing, and all things data storage.

This week we saw two companies making big investments in H2O, there's yet another vulnerability out there that could have a Heartbleed-like impact on data centers around the globe, and Google reports that it has been ignoring more than half of the removal requests it has received in the last year.

Want to get the rest of the story? Check below for the headlines in our weekly infographic, and you can find the links for each story further down on the page.

Read More

Topics: TWID

The Benefits of Site-to-Site Data Replication for Customers and Web Hosts Alike

Posted by Mary McCoy on May 13, 2015 11:00:00 AM

Backup is in and of itself a contingency plan, and it can get confusing when we start throwing around terms like data replication. How is that any different than backup, which is literally copying data and storing it somewhere else?

If your clients are already backing up data locally, they may think they’re covered, and it’s up to you to convince them otherwise. At the same time, you can’t assume your own data center is invincible. Do you have a second layer of defense for the copied data you’re already storing should IT hit the fan?

Read More

Topics: Backups, data protection, data recovery, server backup

This Week in Data (May 8, 2015)

Posted by Ben Austin on May 8, 2015 10:40:45 AM

"This Week in Data" is a weekly infographic that aims to serve as a quick and easy way for our readers to catch up on the latest news about the people and organizations that are shaking up the world of big data, cloud computing, and all things data storage.

This week we saw the discovery of a new malware that goes above and beyond to keep itself hidden, more WordPress plugins that are leaving millions of websites vulnerable to attack, and a federal court ruled against the mass collection of telephone data by the NSA.

Looking for more? Check out the infographic below and then scroll down to get the links for each of the stories we covered.

Read More

Topics: TWID

How Domain Hijacking Works and What Web Hosts Can Do about It:

Posted by Mary McCoy on May 6, 2015 10:40:00 AM

As web hosting providers, your business is only successful if your customers' websites are live and generating new business for them. Still, there are threats which can lead to downtime that your customers can ill afford.

You're likely already aware of domain hijacking, a targeted attack that manipulates the communication between your customers' domain name and your web server, thereby taking their website offline and replacing with the hijacker's website. Your customers may not know about this risk, and you can't rely on the domain registration company they're working with to provide the resources needed to make them savvier website owners.

That's where you come in! 

Read More

Topics: hosted services, Webhosting, data protection

This Week in Data (May 1, 2015)

Posted by Ben Austin on May 1, 2015 10:25:00 AM

"This Week in Data" is a weekly infographic that aims to serve as a quick and easy way for our readers to catch up on the latest news about the people and organizations that are shaking up the world of big data, cloud computing, and all things data storage.

This week Google is trying to help users defend against phishing attacks, there's a newly discovered malware that is turning unsuspecting computers into spam bots, and Microsoft is flexing its machine learning muscle with a new website that guesses visitors' ages.

Are you at the edge of your chair yet? Scroll down the page to read all the headlines in the infographic below and then scroll just a little bit further to find links to each full story.

Read More

Topics: cloud, cloud computing, TWID, security

Site-to-Site: Disaster Recovery for your Backups

Posted by Ben M. Thomas on Apr 28, 2015 9:00:00 AM

We all know how effective R1Soft’s Server Backup Manager is at protecting your server infrastructure. We hear stories on a weekly basis about how having a reliable backup has saved someone from truly dire circumstances. But have you given much thought about the backup of your backups? 

Over the years, our users have tried numerous approaches to protecting their backup systems. Up until recently, many of those approaches could only be recommended as a solution to the worst possible scenario.

Read More

Topics: disaster recovery, multi-point replication, Product Release, Product Update, site-to-site

This Week in Data (April 24, 2015)

Posted by Ben Austin on Apr 24, 2015 6:30:00 AM

 

"This Week in Data" is a weekly infographic that aims to serve as a quick and easy way for our readers to catch up on the latest news about the people and organizations that are shaking up the world of big data, cloud computing, and all things data storage.

This week Google officially announced that it's "experimenting" in the mobile wireless industry, Microsoft is giving Office 365 customers the final say on their data security, and IBM makes a big move toward preventing cybercrimes.

Are you at the edge of your chair yet? Scroll down the page to read all the headlines in the infographic below and then scroll just a little bit further to find links to each full story.

Read More

Spring Cleaning Tips: Returning an Unused License

Posted by Ben Austin on Apr 23, 2015 11:37:00 AM

It's that time of the year again - time to get out the old rake, paintbrush and mop to clean up all the clutter that has accumulated around you over the last few months. For most people this process typically involves the rehabilitation of your house and lawn, but for technical folks it should also include an audit and clean up of the data and infastructure that your company relies on to do business.

In order to help you in your organization's cleaning efforts, we decided to do a short series of blog posts that will provide tips for managing and maintaining an orderly R1Soft environment. While many of these tips may be simple and straight forward, it's important to remember to build them into your schedule on a monthly or quarterly basis, just to alleviate some of the labor when it comes time for next year's spring cleaning.

Read More

Topics: SPLA, How-To, Server Backup Manager, Spring Cleaning