WP Administrator

The First Computer Virus

A computer virus is typically defined as a malware program that replicates itself by inserting copies or modified copies of itself into other computer programs, data files, or boot sectors of hard drives. When this replication is successful the affected area is said to be infected. The term computer virus is also used in a more broad

Read More

Security Tip

you can check the strength of your passwords using tools like this http://www.passwordmeter.com/

Read More

What is spyware

Spyware is a type of malicious software that is spread around on the internet. The term spyware is used to describe software that carries out certain behaviours or operations without obtaining user consent. Such behaviours include but are not limited to: advertising, personal information gathering, and even changing computer settings and configurations. Spyware can be

Read More

5 Ways you can use Google Apps

Google has been  known to offer a wide variety of solutions that changes the way we go about using the internet. Google Apps have played a great role in this respect. Google Apps are known for being able to do a lot: e-mails, calendars, documents, cloud storage. However the fact remains that you many still

Read More

What is data exfiltration?

Data exfiltration is formally defined as the unauthorised transfer of sensitive information from a target’s system or network by an attacker to another location. Data is always moving around in network this makes it very hard to detect an exfiltration attack which makes it all the more serious and devastating. Such a transfer of data

Read More

Security Tip

use 2 factor authentication to be safe when accessing your e-mails or social media accounts on untrusted or public computers

Read More

Password Hardening

As computer processing power increases the security of traditional passwords decreases due to vulnerability to what is known as dictionary attacks or brute force attacks. These are attacks where an attacker computer puts together a set of passwords and tries them out until your account is compromised. To face this threat the concept of password

Read More

Security Tip

Avoid entering sensitive data like your credit card numbers or any other financial or sensitive information into any public computer.

Read More

Reach out

Re-Architect

This methodology requires the most effort to implement but it results in the most optimised recurring cost and will provide the best scalability for apps. This involves re-adapting the code of applications and the heavy use of SAAS solutions in order to replace existing hosted applications.

Re-Platform

This method utilizes the power of  PAAS services, like transferring a database to an as-a-service model,  the use of containers for some apps or the use of network/security functions as a service. Greater scalability and lower cost of operation is achieved.

Re-Host (Lift & Shift)

the migration of workloads from  to the cloud without changing the architecture. Machines get to keep their  OS and apps. This is the quickest and easy way to migrate, but since its  utilising IAAS, its is also the most expensive on the long term.