The Importance of Secure Email Hosting

The Importance of Secure Email Hosting

When former United States Special Counsel Robert Mueller testified before Congress in July 2019, information security experts paid attention to his testimony for reasons that were more technical than political. One of the various matters that Mueller investigated during his tenure was the hacking of email accounts operated by the Democratic National Committee as well…

Details
Understanding Hybrid and Private Cloud Systems

Understanding Hybrid and Private Cloud Systems

Cloud computing, at least as we came to know it during its inception in the late 1990s, has changed significantly. When most people think about “the cloud,” they have a vision of public cloud computing, which encompasses popular services such as Microsoft Office 365, Google’s G Suite for business productivity, and Software-as-a-Service solutions such as…

Details
Understanding HIPAA Server Compliance

Understanding HIPAA Server Compliance

One of the main goals of the Health Insurance Portability and Accountability Act is to protect the privacy and integrity of patient health information, particularly when it is handled in electronic formats. Business entities that deal with protected health information in the United States are expected to comply with certain HIPAA guidelines, and this goes…

Details
How Hackers Can Take Down 40 Websites in Minutes

How Hackers Can Take Down 40 Websites in Minutes

Here’s a situation that underscores the importance of network security these days: a novice hacker working for the research and development department of a Japanese automaker was able to exploit a cross-site scripting vulnerability to infiltrate a server and compromise 40 websites in seven minutes. Method of Attack Used in the Hack The attack started…

Details