Blockchain-based VPNs: The Next Step in Privacy Tech?
Could open source bandwidth utilized by blockchain be the alternative to today’s VPN? Every person who goes online today fights a losing privacy battle. Every site we visit, every app we download, every service we subscribe to collects our personal data. The number of places where this accumulates online shows ... Read More
Is Your Web Host Taking Cybersecurity Seriously?
If you’ve read our article on website security tips, and taken all the necessary steps to secure your new website before it goes live, well done. You are clearly taking your own security seriously. Unfortunately, the same cannot be said for many web hosts. And even more, unfortunately, the security ... Read More
Does Your Organization ‘Get’ Chaos Engineering?
Chaos engineering aims to prevent security issues and outages before they happen. So why aren’t more organizations using it? In many ways, the cloud computing movement has simplified technology infrastructure for organizations across the globe. Instead of having to manually maintain individual servers or run an entire data center on-premises, ... Read More
Is Your Smartphone App at Risk of Infecting Users?
The time to bring in security during the application development process should not be right before launch We live in a world of threats. They’re all around us in the real world, in the air and in cyberspace. What can we do when measures we put in place to protect ... Read More
Current Cybersecurity Market Strong: What’s Driving It?
Cybersecurity is a big business and it’s going to get bigger. Individual users, small business owners, and IT professionals at international corporations know that threats occur every day. Staying ahead of those threats is the only way to protect proprietary data, network integrity, and network... Read More → The post ... Read More
Setting Up A Self-Signed TLS/SSL Certificate on Apache
SSL is a fundamental piece of technology when you want to run a protected Apache site. SSL certificates permit you to scramble all the traffic sent to and from your Apache site to keep others from seeing the majority of the traffic. It utilizes open key cryptography to set up ... Read More
How To Clean A Hacked Installation of Nginx
There are literally hundreds of ways to secure & solidify a Nginx server after an attack. But, what does it REALLY need to be cleaned and secure? What are the essential changes you have to make to feel secure again? To answer that question, we’ll have to investigate what the ... Read More
Setting Up A Free TLS/SSL Certificate With “Let’s Encrypt”
SSL is short for secure sockets layer, which is an encryption standard that is used to encrypt data going between the browser in the server. In other words, an SSL protects data submitted on your site via visitors and customers. You set up SSL by adding an SSL certificate to ... Read More
How To Protect Your Website Against A Cross-Site Scripting (XSS) Attack
One of the most common methods that hackers use/will use to attack your website is a cross-site scripting (XSS) attack. Basically, an XSS attack is where a hacker will take advantage of an XSS vulnerability to execute a malicious JavaScript when users visit your website. The consequences of an XSS ... Read More
6 Simple Ways To Protect Your Website From Hackers
If there’s one specific reason why website owners don’t take steps to boost their online security to protect their blogs and websites from hackers, it’s usually because they believe one of two things: They don’t believe their website or blog has anything worth of real value to hackers They don’t ... Read More