cybersecurity

What is data exfiltration?

Data exfiltration is formally defined as the unauthorised transfer of sensitive information from a target’s system or network by an attacker to another location. Data is always moving around in network this makes it very hard to detect an exfiltration attack which makes it all the more serious and devastating. Such a transfer of data

Read More

Password Hardening

As computer processing power increases the security of traditional passwords decreases due to vulnerability to what is known as dictionary attacks or brute force attacks. These are attacks where an attacker computer puts together a set of passwords and tries them out until your account is compromised. To face this threat the concept of password

Read More

Password Manager Apps

Today you can’t live in the business world without spending some time online. Your online presence is secured by the passwords that secure your many accounts. The volume of the tragedy that can occur once any of your passwords is compromised needs no description. It is also a well established fact that you simply cannot have

Read More

What is a Phishing Attack?

A phishing attack is basically an attack that can be used by a hacker to obtain information about you simply by asking for it. This is a rather simplified definition. What actually happens is that the attacker typically throws bait and waits for you to catch it. If you do, you are hacked. You can

Read More

Reach out

Re-Architect

This methodology requires the most effort to implement but it results in the most optimised recurring cost and will provide the best scalability for apps. This involves re-adapting the code of applications and the heavy use of SAAS solutions in order to replace existing hosted applications.

Re-Platform

This method utilizes the power of  PAAS services, like transferring a database to an as-a-service model,  the use of containers for some apps or the use of network/security functions as a service. Greater scalability and lower cost of operation is achieved.

Re-Host (Lift & Shift)

the migration of workloads from  to the cloud without changing the architecture. Machines get to keep their  OS and apps. This is the quickest and easy way to migrate, but since its  utilising IAAS, its is also the most expensive on the long term.