How can IT Decision Makers evaluate their Cloud Computing Options? #2 – Control
The 5 most important considerations in going to “the cloud” explained. The second part of our series deals with the topic of Control.
Author Prodosh Banerjee on 13 June 2023 Prodosh Banerjee's blog
The 5 most important considerations in going to “the cloud” explained. The second part of our series deals with the topic of Control.
Author Prodosh Banerjee on 12 June 2023 Prodosh Banerjee's blog
The 5 most important considerations in going to “the cloud” explained. The first part of our series deals with the topic of Convenience.
Author David Poole on 10 October 2022 David Poole's blog
If you are running Windows Server in the cloud, which you want to access via remote desktop (RDP) there are some basic security rules you need to follow. This is necessary, first and foremost because exposing RDP to the internet is “low hanging fruit” for hackers. We highly recommend taking the following ten steps.
Author Prodosh Banerjee on 1 April 2022 Prodosh Banerjee's blog
IT security is a long and continuous process. But there are also quick measures you can implement immediately to improve your security and reduce the risk of ransomware infiltration. Here we present three of them.
Author Safe Swiss Cloud on 17 March 2022 Safe Swiss Cloud's blog
Safe Swiss Cloud’s new IT security services help customers improve their IT security and reduce their ransomware risk. The services can be seamlessly added to new as well as existing IT infrastructures. They help to identify risks early (SIEM, Active Directory Monitoring, End-Point Monitoring, Email, Firewall) and to recover from attacked environments (Ransomware Recovery). The regular monitoring of security services contributes significantly to the improvement of IT security. Safe Swiss Cloud therefore offers its IT security services with monitoring.
Author David Poole on 17 January 2022 David Poole's blog
Without the cloud it is very difficult to store and share the huge volumes of data needed for genome sequencing. Given the sensitivity of human genome data in terms of ownership and privacy, security and compliance are paramount.
Author Prodosh Banerjee on 17 May 2021 Prodosh Banerjee's blog
Organisations, whose functions are classified as “system relevant” by regulators (hospitals, banks etc.), suppliers to these organisations and those who provide important essential services, need to meet special criteria for business continuity: they need to be up and running again very quickly. In this blog post, we provide answers to the most important questions related to business continuity for cloud systems and services.
Author David Poole on 28 April 2021 David Poole's blog
You have heard of containers, but find them a bit of a mystery? Then this article is perfect for you. In it, we explain the concept and characteristics of containers. This helps to understand why containers are one of the big trends in IT.
Author David Poole on 14 April 2021 David Poole's blog
In this post, I will show you how to make your application data persist by adding a persistent volume claim to an already deployed pod/container.
Author Prodosh Banerjee on 24 March 2021 Prodosh Banerjee's blog
With this blog post, our goal is to help customers to avoid irrecoverable loss of data and computing resources, by making sure they have considered the scenarios they need to guard against and have recovery plans for these.