The 5 most important considerations in going to “the cloud” explained. #1 – Convenience
Checklist for securing remote desktop access in the cloud
If you are running Windows Server in the cloud, which you want to access via remote desktop (RDP) there are some basic security rules you need to follow. This is necessary, first and foremost because exposing RDP to the internet is “low hanging fruit” for hackers. We highly recommend taking the following ten steps.
Three things to immediately strengthen your ransomware protection
IT security is a long and continuous process. But there are also quick measures you can implement immediately to improve your security and reduce the risk of ransomware infiltration. Here we present three of them.
Safe Swiss Cloud announces services to strengthen IT security
Safe Swiss Cloud’s new IT security services help customers improve their IT security and reduce their ransomware risk. The services can be seamlessly added to new as well as existing IT infrastructures. They help to identify risks early (SIEM, Active Directory Monitoring, End-Point Monitoring, Email, Firewall) and to recover from attacked environments (Ransomware Recovery). The regular monitoring of security services contributes significantly to the improvement of IT security. Safe Swiss Cloud therefore offers its IT security services with monitoring.
Genome Sequencing in the Cloud
Without the cloud it is very difficult to store and share the huge volumes of data needed for genome sequencing. Given the sensitivity of human genome data in terms of ownership and privacy, security and compliance are paramount.
Cloud Infrastructure: When is a Dual Data Centre Solution a Necessity?
Organisations, whose functions are classified as “system relevant” by regulators (hospitals, banks etc.), suppliers to these organisations and those who provide important essential services, need to meet special criteria for business continuity: they need to be up and running again very quickly. In this blog post, we provide answers to the most important questions related to business continuity for cloud systems and services.
What is a Container and what is a Container Image?
You have heard of containers, but find them a bit of a mystery? Then this article is perfect for you. In it, we explain the concept and characteristics of containers. This helps to understand why containers are one of the big trends in IT.
Tutorial: Adding Persistent Storage to a Container in Kubernetes
In this post, I will show you how to make your application data persist by adding a persistent volume claim to an already deployed pod/container.
Do you need to worry about backups in the cloud?
With this blog post, our goal is to help customers to avoid irrecoverable loss of data and computing resources, by making sure they have considered the scenarios they need to guard against and have recovery plans for these.
How to horizontally autoscale pods in Kubernetes
In this article I demonstrate how to set up an autoscaler to scale up the pods when the CPU usage exceeds a certain threshold and back down again.
Cloud infrastructure: Why only European providers can offer adequate data sovereignty and data protection
Customer and other confidential company data is one of the most valuable assets in the digitalized economy. To protect this asset adequately in the cloud, there is currently only one secure strategy: to work with a European owned cloud infrastructure partner.