Archive for the ‘Security’ Category

Security Recommendations, Part 2: Encryption at Rest

Continuing our 2022 Security Recommendations series, in this post, we will discuss why it’s important to use encryption at rest in all your devices. What is Encryption at Rest? In simple words, encryption at rest is the process of securely…

Security Recommendations, Part 1: Protect Your Personal Information

Many of the topics that we will cover in this new series are common sense; however, every year, we need to revamp our personal security practices in person and online.  This installment will cover how we can protect our personal…

Cybersecurity Trends in 2022

In an increasingly online world, cybersecurity has become more critical than ever. This is particularly true for companies and organizations that handle personal or sensitive data of consumers and citizens. Why is Cybersecurity so Important? With the huge prevalence of…

3-2-1 Backup Strategy – Part 3: External Backup via Cloud Service

Now that we have covered backing up your computer and mobile devices locally using an external hard drive or a NAS, we can now set up our final security measure: backing up data via third-party cloud service. There are many…

Security Monthly: Company Data in the Cloud

This article is the first entry in the Security Monthly series, where we will discuss recent and important events regarding security incidents, data protection, notable attacks, and related topics. To kick off our series, we will cover four attacks that…

3-2-1 Backup Strategy – Part 2: Mobile Devices

Back Up Your Mobile Device Following our first article on the 3-2-1 Backup Strategy, we are now going to discuss backing up your mobile devices (smartphones, tablets, etc.). While both Android and iOS devices have their own cloud storage backup…

3-2-1 Backup Strategy – Part 1: Desktop/Laptop Computers

Many people know that backups are a good idea, yet not everyone acts to ensure their data is backed up in case a device is stolen, lost, or damaged. By device, we’re not specifically talking about your smartphone; this term…

FileCloud Single Sign-on with YubiKey and ADFS

What is SSO? Single sign-on (SSO) is an authentication scheme that allows a user to log in with a single ID and password to any of several related, yet independent software systems. True single sign-on allows the user to log…

A Brief History of Backend Data Security

Software is not like wine and cheese, it does not get better with age, on the contrary, security strength decreases over time because of software obsolescence. Data security has always been important. But since more people are working remotely as…

Keeping your Cloud Infrastructure Secure Using SIEM

What if instead of building a solution that processes and collects logs and security events, you could push the problem to the cloud through an encrypted channel? As a result, you would easily get detailed reports about threats to your…

Worldwide

FileCloud
CodeLathe Technologies Inc.
dba FileCloud
125 Park Avenue FL 25
New York, NY 10017-5550

Fax: +1 (866) 824-9584

Europe

FileCloud Technologies Limited
Ducart Suite,
Castletroy Park Commercial Centre, Castletroy,
Limerick, Ireland


Copyright © FileCloud. All Rights Reserved.