Cloud-based solutions best defence against cyber “DDoS” attacks?

A recent paper on distributed denial of services (DDoS) attacks by Neustar concludes that only cloud-based DDoS solutions offer a comprehensive defence against increasing attacks that are expected to surge by as much as 40% in 2012.

“Cloud solutions provide the bandwidth (as measured in Gbps) to absorb today’s massive network layer attacks, plus the technology diversity and processing power to handle application-layer and high packets-per-second strikes,” said Neustar.

Neustar...

By VI, 12 June 2012, 0 comments. Categories: Hacking, Hardware, Security.

2012: the year of the cloud

2012. This is the year of the cloud. This is the year that business is realising it needs the cloud. But why?

Efficiencies is the answer.

If surviving the GFC taught us one thing, it’s how to be lean. If business, and especially small business is to survive and even thrive post-GFC, it must learn to operate on a strict diet.

To be lean and mean. This means not just micro-managing your...

By Nathan Elcoate, 23 May 2012, 0 comments. Categories: Economy, Public, Security.

The cloud security question: Benefit or barrier?

Despite perceptions to the contrary, small to medium sized businesses (SMBs) are benefiting from increased IT data security as a result of a move to cloud computing, according to new research from comscore and Microsoft.

The results of the research, carried out among SMBs in Hong Kong, India, Malaysia, Singapore and the US, oppose the perception of security as the Achilles heel of the cloud argument.

The study shows that 35% of U.S. companies surveyed had experienced noticeably higher levels of security since...

By Matt Henkes, 15 May 2012, 1 comment. Categories: Adoption, Best Practice, Security.

Cloud Backup Or Sync?

Whether your data is stored in the cloud, on your desktop or on your server, you should be backing it up at least daily.

There are a myriad of backup options available on the desktop, from Windows NT Backup to Symantec and other more advanced options.

Some are mirror image backups, some are file by file. As well as backing up we should also be testing our restore processes to make sure our...

By Nathan Elcoate, 14 May 2012, 1 comment. Categories: Best Practice, Consumer, Security.

Data breach costs fall despite increased security challenges

The average cost of a serious IT security breach has fallen over the past two years, despite an increase in their frequency and severity, a new report has claimed.

For the first time in seven years the average cost of a breach has decreased, from $7.2m in 2010 to $5.5m last year. Also, the cost per compromised record fell by 10% to $194, the lowest since 2007.

The Ponemon Institute’s research, carried out on behalf of security specialist Symantec, also revealed that negligent employees are still the...

By Matt Henkes, 21 March 2012, 0 comments. Categories: Research, Security.

Apple devices seeping into Corporate IT networks

Apple has quietly been releasing information on now to integrate its growing list of Smart devices with Enterprise IT.

While currently synonymous with consumers or perhaps less kindly termed "masses", the evidence is clear that Macs, iPads and iPhones are infiltrating corporate environments either knowingly or unknowingly.

The recent emergence of Apple’s iCloud via the Lion OS upgrades also allows consumers to synch their personal data including apps, music, videos and e-books to Apple's remote Datacentres.   ...

By VI, 13 March 2012, 0 comments. Categories: Applications, Enterprise, Industry, Security.

How consumerisation is driving cloud acceptance

There has been a thunderstorm of growing noise surrounding Cloud Computing in the past 24 months. Vendors, analysts, journalists and membership groups have all rushed to cover the Cloud medium - although everyone seems to have their own opinion and differing definition of cloud computing. According to the most common definition, it is Internet-based computing where shared resources, software and information are supplied to users on demand, rather like a utility company would supply electricity, water or...

By Ian Moyse, 13 March 2012, 0 comments. Categories: Adoption, Applications, Consumer, Security.

Cloudy with a Chance of More Venture

Trust makes the world go round.  Without trust, little is possible. Harry Potter author J.K. Rowling wrote, “Never trust anything that can think for itself if you can’t see where it keeps its brain.” 

Quite fitting when you talk about trusting data that resides in the all-invisible cloud. The age-old argument for whether to self-host or outsource always boiled down to trust.

Cloud data is like the tree in the forest: when someone tampers with it,...

By Victor Cruz, 07 March 2012, 0 comments. Categories: Security, Vendors.