Check-out our new look and give us some feedback!

Tag: HIPAA

Reading Time: 5 minutes
Threat Stack

Introduction

This article will review some of the more technical aspects of Threat Stack. Threat Stack is a platform-independent intrusion detection system (IDS) designed to provide users with a unique view into various integrated server security functions. It monitors both Linux and Windows servers as well as Kubernetes or other container-based server infrastructures to observe behaviors and detect malicious, uncommon, and risky activity.

Continue reading →
Reading Time: 4 minutes

Introduction

Microsoft Exchange Security Update
   

In this article, we provide updated information concerning the ongoing threat posed by the malware directed at Microsoft Exchange Servers noted in CVE-2021-26855. We also furnish the steps needed to update and secure your Microsoft Exchange Server. In a recent post, the Cybersecurity & Infrastructure Security Agency posted a priority security advisory regarding the recent Microsoft Exchange Server vulnerability. They state:

Continue reading →
Reading Time: 4 minutes
SIEM 2

Security Information and Event Management (or SIEM) is a subset of the computer security field, where applications and services join forces with security event management and security information management. When united, these disciplines provide significantly improved real-time statistical data and threat analysis of alerts generated by the related applications. The 2021 Internet Security Threat Report from Sophos denotes that are not only the number of attacks on the rise but also the diverse nature of methodologies and vectors of incursions used. This necessitates the fact that adding a SIEM is especially warranted at this time.

Continue reading →
Reading Time: 6 minutes

Cloud computing is a model for empowering users to access a useful, network-accessible, shared pool of resources that allows for quick changes to settings and configurations with minimal intervention from a service provider in an easy-to-maneuver self-service management interface.

Continue reading →
Reading Time: 4 minutes

What is an Intrusion Detection System? 

An intrusion detection system (or IDS) is a hardware device or software program that observers a network or system for security policy violations or malicious activity. Typically, any activity or intrusion violation is reported to either an administrator or is collected and logged in a central location using a security information and event management system (or SIEM) system. This system is a security-based technology developed initially for detecting exploits and vulnerabilities used against a computer or other target applications.

Continue reading →
Reading Time: 5 minutes

Introduction

install.esxi6

In this tutorial, we will learn how to install and configure VMware ESXi. The majority of VMware cloud product installations are targeting experienced Linux or Windows administrators. However, we will try to simplify the process as much as possible. If you are new to hypervisors like ESXi or VMware vSphere, this guide might be right for you! Let’s start by reviewing what ESXi is.

Continue reading →
Reading Time: 10 minutes
what is blockchain

The idea of blockchain itself may sound complicated, but the premise is simple. Blockchain is a zero-trust, fully decentralized peer-to-peer data storage system that spreads verified information across participants in the chain, referred to as nodes. Blockchain stores this information in blocks that are chained together. As new data arrives, it is recorded into a block. Once a block has been filled with information, it is linked to the previous block. This process allows the data to be bound together in sequential and chronological order. 

Continue reading →
Reading Time: 7 minutes
Multiple Clouds

If you have been in the hosting industry for some time, you most likely had to upgrade your hosting package or resize your server at some point. As your business grows, so do the resources needed to run that business. Over the years, someone has most likely recommended a private cloud solution to you. You probably asked yourself why you would need a more expensive private solution like VMware cloud when you have a powerful VPS server or Dedicated server that is perfectly capable of handling your existing traffic.

Continue reading →
Reading Time: 7 minutes
cloud computing projects

What is a Project?

A project is a group of virtual machines, servers, and online assets such as domain registration that work together to deliver your business online. These cloud computing based servers work in tandem to ensure that your website and applications are always online, regardless of operating your business on a dedicated, VPS, or cloud environment.

Continue reading →
Reading Time: 6 minutes

Liquid Web’s new Cloud Platform is an environment designed with website uptime, ease of use, and scalability in mind. It combines the easy-to-use cPanel-based environment with a Load Balancing solution. It can be adjusted to suit your specific online needs. This platform is also included in our Fully Managed Support. Experienced webmasters or developers can opt for our Core-Managed environment, using the LAMP stack (Linux, Apache, MySQL/MariaDB, PHP). 

Continue reading →
← Older posts
Have Some Questions?

Our Sales and Support teams are available 24 hours by phone or e-mail to assist.

1.800.580.4985
1.517.322.0434