Two Factor Authentication in the Cloud

Two Factor Authentication in the Cloud

Cyber security is a key aspect of Cloud Computing. Generally data transmission between client devices and cloud is encrypted. However one weak link in the cloud security is the authentication based only on the passwords. In two factor authentication this issue is...
Recovering from Ransomware attacks

Recovering from Ransomware attacks

Ransomware has become one of the major threats to IT infrastructures world wide. Significant planning and security measures must be put in place to guard against ransomware. If a ransomware attack happens, recovering from such an attack may become a daunting task...
Hybrid IT infrastructure

Hybrid IT infrastructure

Most organizations today have embraced cloud infrastructure to some extent. Having part of the IT infrastructure in a public cloud and part on premise is generally refereed to as Hybrid IT infrastructure. On premise IT infrastructure is also referred to as private...