7 Basic Network Security Tips for Small Businesses

7 Basic Network Security Tips for Small Businesses

Some small businesses might think it’s reasonable to assume that hackers and data thieves only go after large targets. Of course these same criminals are well aware of this assumption, which is precisely why they know small businesses are often ripe for exploitation. According to CNBC, in 2019 small businesses were the targets of 43% of all cyberattacks, and more than half of them suffered some type of breach within the

The Home Chef Data Breach Affected 8 Million Customers

The Home Chef Data Breach Affected 8 Million Customers

On May 20, 2020, customers of Home Chef got the unpleasant news that 8 million of their data records had been breached. The stolen information included names, email addresses, phone numbers, the last four digits of credit card numbers, and encrypted passwords. Other information, including mailing addresses and frequency of delivery, “may also have been compromised.” The announcement came about two weeks after Home Chef learned of the breach. This

The RobbinHood Attack Could Cost of Baltimore $18 Million

The RobbinHood Attack Could Cost of Baltimore $18 Million

In May 2019, the city of Baltimore found itself in major IT trouble. A crippling ransomware attack took down systems in almost every department of the government. Files were encrypted and couldn’t be recovered. The perpetrators demanded 13 Bitcoin — about $76,000 — to restore the files. To its credit, the city refused to pay the criminals. To its discredit, the city’s IT management was in such bad shape that

Top Cloud Security Threats Include Misconfiguration

Top Cloud Security Threats Include Misconfiguration

The shared, on-demand nature of cloud computing can only lead to more concerns about data security on one hand and often forgotten areas like misconfiguration on the other. Best Practices Begin with a Solid Cloud Adoption Strategy The Cloud Security Alliance (CSA) actually pegs misconfiguration as a very real component to security threats. The Alliance is the leading global organization that not only sets “standards, certifications as well as best

What You Need to Know About Container Security

What You Need to Know About Container Security

Containerization has revolutionized software deployment. It allows faster deployment cycles, easier scalability, and consistency across environments. It’s a standard part of the DevOps process. Containers provide clear benefits in security, but they offers their own challenges. Making a containerized environment run smoothly and securely requires specialized expertise and experience. Bluwater provides the management and support to keep the software running and minimize the risks. Understanding Containers Software applications have many