Tag: Security

Search
Data protection and data sovereignty in the digital economy

Data protection and data sovereignty in the digital economy

Data protection and data sovereignty are increasingly important in the digital economy — so much that there is even a Data Privacy Day, celebrated every January 28th, since 2007. Why is it so? Because as data becomes more and more valuable for individuals, organizations and institutions, data sovereignty, protection and privacy have become key aspects

READ MORE
Backup

Backups: schedules, frequency and types

Backups are a simple form of disaster recovery (DR) to be protected against contingencies like data corruption or deletion, system failures, faulty updates or cyberattacks.  As the digital world slowly but surely integrates into our daily personal and professional lives, we have to learn to change the way we use, store and manage data in

READ MORE
Cloud security trends and challenges

Cloud security trends and challenges

Cloud security is a top priority as more and more organizations continue to place their data and applications in the cloud. According to data from Statista, as of 2022, about 60% of corporate data was already in the cloud. In fact, not only a large number of companies are already in the cloud, but also

READ MORE
Security Operations Center

What is a Security Operations Center (SOC)?

In IT, a Security Operations Center (SOC) or Information Security Operations Center (ISOC) is a centralized location where an organization’s security team monitors, analyzes, detects and solves any cybersecurity events that might arise. However, in addition to this definition, a SOC can also refer to an in-house team of cybersecurity professionals or an outsourced SOC

READ MORE
Choosing an OpenVPN client

Which OpenVPN clients to use and how to install them

The OpenVPN clients we recommend at Stackscale are: an easy to install OpenVPN package for Linux, the open source OpenVPN client for Windows and the open source TunnelBlick solution for Mac OS. OpenVPN is a widespread open source Virtual Private Network solution which offers numerous security possibilities. How to install OpenVPN on Linux You can

READ MORE
OSI model (Open Systems Interconnection model)

OSI model: layers & security attacks

The OSI model, short for Open Systems Interconnection model, is a 7-layer model that describes an architecture of data communications in computer networking. The OSI reference model was developed in the late 1970s. However, due to its late invention, it was not implemented and has only remained as a reference model. The current model implemented

READ MORE
secure connection with VPN

What is a VPN, how does it work and what is it used for?

A VPN or Virtual Private Network provides online security, privacy and anonymity. It is an excellent tool for protecting daily digital activities, both business and personal. From something as simple as sending an email to connecting to the dashboard of your company’s cloud environment without it being accessible over the Internet. In this article, we

READ MORE
SHA-1 cryptographic algorithm’s end of useful life

SHA-1 cryptographic algorithm’s end of useful life

SHA-1 cryptographic algorithm has reached its end of useful life, after 27 years since its publication. The National Institute of Standards and Technology (NIST) recommends replacing it for newer, more secure algorithms like SHA-2 and SHA-3. It aims for the SHA-1 hash function to be completely phased out by the end of 2030. SHA-1 cryptographic

READ MORE
Password security best practices to keep passwords safe in 2022

Security best practices to keep passwords safe in 2022

Keeping passwords safe is really important. It is indeed especially critical considering the increasing number of cyberattacks worldwide. We have passwords for many of our daily activities — social media, emails, bank accounts, etc. Therefore, using strong passwords must not be an option, as it is the simplest way to protect our devices and information.

READ MORE
Tipos, protección y mitigación de ataques DDoS

DDoS attacks: types, protection and mitigation

DDoS attacks aim to take down online services by flooding them with an enormous amount of incoming traffic, originating from multiple sources. This type of cyberattack can have many negative effects on business profits, as well as damage a company’s reputation. Let’s see what a DDoS attack consists of and how to protect services and

READ MORE

Our expertise

Stackscale’s team is formed by experts who will help you anytime, 24/7.

Your Private Cloud

Grow and scale at your own pace with Stackscale’s dedicated cloud.