Choosing Between Cloud or On-Premises Storage for Small Business

In this Ask the Admin, Russell Smith looks at the benefits of cloud storage and why a combination of cloud and on-premises solutions is sometimes a happy medium.

The post Choosing Between Cloud or On-Premises Storage for Small Business appeared first on Petri.

Continue reading Choosing Between Cloud or On-Premises Storage for Small Business

Selecting the Right SME Storage Solution Part 2: Network Attached Storage

In the second part of this article, Russell Smith looks at Network Attached Storage solutions for SMEs.

The post Selecting the Right SME Storage Solution Part 2: Network Attached Storage appeared first on Petri.

Continue reading Selecting the Right SME Storage Solution Part 2: Network Attached Storage

Selecting the Right SME Storage Solution Part 1: Windows Server

In part one of this article, Russell Smith looks at the advantages for small businesses of server hardware running Windows Server Essentials for local storage needs.

The post Selecting the Right SME Storage Solution Part 1: Windows Server appeared first on Petri.

Continue reading Selecting the Right SME Storage Solution Part 1: Windows Server

New Linux Malware Exploits SambaCry Flaw to Silently Backdoor NAS Devices

Remember SambaCry?

Almost two months ago, we reported about a 7-year-old critical remote code execution vulnerability in Samba networking software, allowing a hacker to remotely take full control of a vulnerable Linux and Unix machines.

We dubbed the… Continue reading New Linux Malware Exploits SambaCry Flaw to Silently Backdoor NAS Devices

Bottlenecks of Modern Data Storage Technologies

Get an overview of storage technologies focusing on the internal organization of data storage – going from the hardware level of a physical hard drive to the logical level of a file system layout.

The post Bottlenecks of Modern Data Storage Technologies appeared first on Petri.

Continue reading Bottlenecks of Modern Data Storage Technologies

Travel Routers, NAS Devices Among Easily Hacked IoT Devices

A researcher poked holes in seven different IoT devices at last week’s Security Analyst Summit, including a host of travel routers, NAS devices, and an IP-enabled camera. Continue reading Travel Routers, NAS Devices Among Easily Hacked IoT Devices

Travel Routers, NAS Devices Among Easily Hacked IoT Devices

A researcher poked holes in seven different IoT devices at last week’s Security Analyst Summit, including a host of travel routers, NAS devices, and an IP-enabled camera. Continue reading Travel Routers, NAS Devices Among Easily Hacked IoT Devices

Old SSH Vulnerability at Center of Credential-Stuffing Attacks

Akamai warns that attackers are compromising IOT devices and using them as proxies to test stolen credentials against web-based applications. Continue reading Old SSH Vulnerability at Center of Credential-Stuffing Attacks