Ricky M. and Monique L. Magalhaes

Reasons to Secure Web Apps in AWS

AWS has become de facto in hosting many applications with more focus on securing web applications in AWS. Amazon does provide a secure foundation and some believe that this is enough security but the Shared Responsibility Model laid out by AWS reminds users that they too have responsibility for securing the application layer. In this article we will consider why this is fundamental to app security and how this can be achieved.

Considerations for AWS

When utilising AWS there are a few things one should consider to side-step common blunders that are often made. In this article we will look at the areas that should be given careful consideration, for these errors to be avoided, as best possible, and ultimately enhance the user experience of AWS.

Cryptolocker Mitigation Strategies Explained

CryptoLocker ransomware, a malware for extorting money, remains an evident concern for many. Once infected you are not left much choice but to pay your way out or say goodbye to your documents or data. The answer to this attack is prevention rather than cure, in this article we will consider the ways to prevent or avoid falling victim to this form of attack.

Windows 10 Varieties Explained – Choosing the Best Fit for You

It is understood that Microsoft will release several versions of Windows 10 later this year. In this article we consider the security features and various flavours for release. Looking at how one edition may differ from the next, as the characteristics and security feature offerings would help you determine which is the best suited to you and your organisations specific requirements.

Scroll to Top