Tag: Security

Search
Data protection and data sovereignty in the digital economy

Data protection and data sovereignty in the digital economy

Data protection and data sovereignty are increasingly important in the digital economy — so much that there is even a Data Privacy Day, celebrated every January 28th, since 2007. Why is it so? Because as data becomes more and more valuable for individuals, organizations and institutions, data sovereignty, protection and privacy have become key aspects

READ MORE
Backup

Backups: schedules, frequency and types

Backups are a simple form of disaster recovery (DR) to be protected against contingencies like data corruption or deletion, system failures, faulty updates or cyberattacks.  As the digital world slowly but surely integrates into our daily personal and professional lives, we have to learn to change the way we use, store and manage data in

READ MORE
Cloud security trends and challenges

Cloud security trends and challenges

Cloud security is a top priority as more and more organizations continue to place their data and applications in the cloud. According to data from Statista, as of 2022, about 60% of corporate data was already in the cloud. In fact, not only a large number of companies are already in the cloud, but also

READ MORE
Security Operations Center

What is a Security Operations Center (SOC)?

In IT, a Security Operations Center (SOC) or Information Security Operations Center (ISOC) is a centralized location where an organization’s security team monitors, analyzes, detects and solves any cybersecurity events that might arise. However, in addition to this definition, a SOC can also refer to an in-house team of cybersecurity professionals or an outsourced SOC

READ MORE
Choosing an OpenVPN client

Which OpenVPN clients to use and how to install them

The OpenVPN clients we recommend at Stackscale are: an easy to install OpenVPN package for Linux, the open source OpenVPN client for Windows and the open source TunnelBlick solution for Mac OS. OpenVPN is a widespread open source Virtual Private Network solution which offers numerous security possibilities. How to install OpenVPN on Linux You can

READ MORE
OSI model (Open Systems Interconnection model)

OSI model: layers & security attacks

The OSI model, short for Open Systems Interconnection model, is a 7-layer model that describes an architecture of data communications in computer networking. The OSI reference model was developed in the late 1970s. However, due to its late invention, it was not implemented and has only remained as a reference model. The current model implemented

READ MORE
secure connection with VPN

What is a VPN, how does it work and what is it used for?

A VPN or Virtual Private Network provides online security, privacy and anonymity. It is an excellent tool for protecting daily digital activities, both business and personal. From something as simple as sending an email to connecting to the dashboard of your company’s cloud environment without it being accessible over the Internet. In this article, we

READ MORE
SHA-1 cryptographic algorithm’s end of useful life

SHA-1 cryptographic algorithm’s end of useful life

SHA-1 cryptographic algorithm has reached its end of useful life, after 27 years since its publication. The National Institute of Standards and Technology (NIST) recommends replacing it for newer, more secure algorithms like SHA-2 and SHA-3. It aims for the SHA-1 hash function to be completely phased out by the end of 2030. SHA-1 cryptographic

READ MORE
Password security best practices to keep passwords safe in 2022

Security best practices to keep passwords safe in 2022

Keeping passwords safe is really important. It is indeed especially critical considering the increasing number of cyberattacks worldwide. We have passwords for many of our daily activities — social media, emails, bank accounts, etc. Therefore, using strong passwords must not be an option, as it is the simplest way to protect our devices and information.

READ MORE
Tipos, protección y mitigación de ataques DDoS

DDoS attacks: types, protection and mitigation

DDoS attacks aim to take down online services by flooding them with an enormous amount of incoming traffic, originating from multiple sources. This type of cyberattack can have many negative effects on business profits, as well as damage a company’s reputation. Let’s see what a DDoS attack consists of and how to protect services and

READ MORE

Our expertise

Stackscale’s team is formed by experts who will help you anytime, 24/7.

Your Private Cloud

Grow and scale at your own pace with Stackscale’s dedicated cloud.

Cookies customization
Stackscale, Grupo Aire logo

By allowing cookies, you voluntarily agree to the processing of your data. This also includes, for a limited period of time, your consent in accordance with the Article 49 (1) (a) GDPR in regard to the processing of data outside the EEA, for instead, in the USA. In these countries, despite the careful selection and obligation of service providers, the European high level of data protection cannot be guaranteed.

In case of the data being transferred to the USA, there is, for instance, the risk of USA authorities processing that data for control and supervision purposes without having effective legal resources available or without being able to enforce all the rights of the interested party. You can revoke your consent at any moment.

Necessary Cookies

Necessary cookies help make a web page usable by activating basic functions such as the page navigation and the access to secure areas in the web page. The web page will not be able to work properly without these cookies. We inform you about the possibility to set up your browser in order to block or alert about these cookies, however, it is possible that certain areas of the web page do not work. These cookies do not store any personal data.

- moove_gdpr_popup

 

Analytical cookies

Analytical cookies allow its Editor to track and analyze the websites’ users behavior. The information collected through this type of cookie is used for measuring the activity on websites, applications or platforms, as well as for building user navigation profiles for said websites, application or platform, in order to implement improvements based on the analysis of data on the usage of the service by users.

Google Analytics: It registers a single identification used to generate statistical data about how the visitor uses the website. The data generated by the cookie about the usage of this website is generally transferred to a Google server in the USA and stored there by Google LLC, 1600 Amphitheatre Parkway Mountain View, CA 94043, USA.

- _dc_gtm_UA-XXXXXXXX-X

- _gat_gtag_UA_XXXXXXXX_X

- _ga

- _gcl_au

- _gid