If you are running Windows Server in the cloud, which you want to access via remote desktop (RDP) there are some basic security rules you need to follow. This is necessary, first and foremost because exposing RDP to the internet is “low hanging fruit” for hackers. We highly recommend taking the following ten steps.
IT security is a long and continuous process. But there are also quick measures you can implement immediately to improve your security and reduce the risk of ransomware infiltration. Here we present three of them.
Safe Swiss Cloud’s new IT security services help customers improve their IT security and reduce their ransomware risk. The services can be seamlessly added to new as well as existing IT infrastructures. They help to identify risks early (SIEM, Active Directory Monitoring, End-Point Monitoring, Email, Firewall) and to recover from attacked environments (Ransomware Recovery). The regular monitoring of security services contributes significantly to the improvement of IT security. Safe Swiss Cloud therefore offers its IT security services with monitoring.
Without the cloud it is very difficult to store and share the huge volumes of data needed for genome sequencing. Given the sensitivity of human genome data in terms of ownership and privacy, security and compliance are paramount.
Organisations, whose functions are classified as “system relevant” by regulators (hospitals, banks etc.), suppliers to these organisations and those who provide important essential services, need to meet special criteria for business continuity: they need to be up and running again very quickly. In this blog post, we provide answers to the most important questions related to business continuity for cloud systems and services.
You have heard of containers, but find them a bit of a mystery? Then this article is perfect for you. In it, we explain the concept and characteristics of containers. This helps to understand why containers are one of the big trends in IT.
With this blog post, our goal is to help customers to avoid irrecoverable loss of data and computing resources, by making sure they have considered the scenarios they need to guard against and have recovery plans for these.
Customer and other confidential company data is one of the most valuable assets in the digitalized economy. To protect this asset adequately in the cloud, there is currently only one secure strategy: to work with a European owned cloud infrastructure partner.