Archive for the ‘Security’ Category

By:


Date:
Aug 18, 2016
Every day, small businesses lose data on dedicated and cloud servers for a number of reasons, but the most incidents occur due to no data security. With the available technology options and services of today, those are unnecessary risks. These scenarios can affect a company strategically, financially, and even legally.  Minimizing risk is one reason why hosting and cloud computing services provide big advantages for small businesses. These services offer entrepreneurs cutting technology and capabilities that can be completely customized without a large up-front investment.… Read More
By:


Date:
Aug 11, 2016
More than ever, modern technologies are a critical part of the world around us. Integrated into business, entertainment,health and countless other applications, anything that impacts the availability of technology services can affect work productivity, affect the bottom line, affect health, or cause major inconveniences. When it comes to business, there is little doubt that the result of a system downtime can be measured in terms of lost opportunity, lost revenue, lost reputation, and lost productivity. Those are the reasons why we talk about High Availability… Read More
By:


Date:
Aug 9, 2016
Computer infrastructure is the backbone for companies across the land. Continuity is a must, therefore the efforts to avoid downtime and data loss is the substance of every systems administrator. Getting to launch an application and rapid time to deployment are often primary points focus in IT initiatives - for a variety of good reasons. However necessary these tasks are, if server security is not a component of this initial infrastructure effort, there are likely to be risk and implications at some point in the… Read More
By:


Date:
Aug 3, 2016
Rural Telecom Magazine decided to highlight the need for cloud and hosting solutions in rural areas. Please review the article published in this month's publication in which they highlighted Codero CEO, Emil Sayegh, to discuss the technology challenges and the available solutions.  Rural Telecom is published by NTCA–The Rural Broadband Association six times a year. BRINGING THE CLOUD TO RURAL FARMS AND BUSINESSES Public health, education, high-tech farming and agriculture, seismic data collection, oil exploration and production, clean energy generation and management, transportation and disaster management are examples of… Read More
By:


Date:
Mar 1, 2016
Today, researchers from a number of universities and organizations around the world announced the DROWN SSL exploit.  DROWN, an acronym standing for Decrypting RSA with Obsolete and Weakened eNcryption, is an exploit that allows for remote decryption of SSL communications even if they’re protected by more advanced cipher suites. DROWN was assigned CVE CVE-2016-0800. Read a detailed analysis and fix to this vulnerability at DROWNattack.com Who is Affected? Anyone who uses SSL for any services including, but not limited to, HTTPS or IMAPS should assume… Read More
Emil Sayegh
By:


Date:
Feb 19, 2016
The Vulnerability: Recently, security researchers working for Google and Red Hat announced a vulnerability in a library commonly used in Linux environments.  Specifically, Glibc getaddrinfo() is susceptible, under certain conditions, to a stack-based buffer overflow attack while performing DNS queries.  This vulnerability has been designated CVE-2015-7547. Who is Affected? Any server running Linux with glibc 2.9 or later is affected.A complete list of the linux distributions affected can be found on the nixCraft community site. What do I need to do? If you are a Proactive Managed customer, we… Read More
By:


Date:
Jan 22, 2016
If you’re running a server or desktop with Linux Kernel 3.8 or higher, you and your website or application are vulnerable to a very serious 0-day local privilege escalation vulnerability. Millions of Linux systems around the world are vulnerable to compromise and must be patched. What Damage Can the Linux Vulnerability Cause? This bug (referred to as CVE-2016-0728) affects the keyrings facility in the kernel, allowing the kernel to cache security data, authentication keys, and other sensitive data. The bug creates a leak in the… Read More
By:


Date:
Apr 16, 2015
Codero wants to urgently let you know that a new critical Windows vulnerability affecting 70 million+ websites hosted on Windows servers has been discovered. Microsoft has deemed this a critical security update for all supported editions of Windows. If you are running any affected version of Windows, you are vulnerable to a remote code execution attack until you install the updates and reboot your servers. This vulnerability can affect both Codero Cloud and Codero's Dedicated Server users. Here's what you need to do to protect your… Read More