hacking

Password Hardening

As computer processing power increases the security of traditional passwords decreases due to vulnerability to what is known as dictionary attacks or brute force attacks. These are attacks where an attacker computer puts together a set of passwords and tries them out until your account is compromised. To face this threat the concept of password

Read More

Security Tip

Avoid entering sensitive data like your credit card numbers or any other financial or sensitive information into any public computer.

Read More

Reach out

Re-Architect

This methodology requires the most effort to implement but it results in the most optimised recurring cost and will provide the best scalability for apps. This involves re-adapting the code of applications and the heavy use of SAAS solutions in order to replace existing hosted applications.

Re-Platform

This method utilizes the power of  PAAS services, like transferring a database to an as-a-service model,  the use of containers for some apps or the use of network/security functions as a service. Greater scalability and lower cost of operation is achieved.

Re-Host (Lift & Shift)

the migration of workloads from  to the cloud without changing the architecture. Machines get to keep their  OS and apps. This is the quickest and easy way to migrate, but since its  utilising IAAS, its is also the most expensive on the long term.