Blog over security

What does a pentest do?

If you are building a cloud-based business or migrating information assets to the cloud, you’re taking a giant step towards improving operational efficiency and cutting costs. However, most of the third party plugins or applications you use to do...

View

Windows issue: Recent update breaks authentication for server admins

A security update from Microsoft may result in authentication failures for Windows domain controllers, according to the company. Do you run any Windows servers? We'll give you the latest update and...

View

Data, healthcare and the cloud: 5 safety strategies

Information security has evolved into one of the most critical aspects of the healthcare industry. Personal information is valuable, but medical data is especially so. Hackers can misuse sensitive...

View

Two factor authentication and session management

If you have a Tilaa VPS, we recommend that you enable free two-factor authentication (2fa), which is a standard benefit offered with all our VPSs. This article will help you understand all advantages...

View

This is how you handle a (possible) security breach

Stolen passwords through Zoom, access to Obama’s Twitter account and - just last month - using Grindr with somebody else's account: hacking is becoming more and more prominent in our daily life. But,...

View