Create and deliver personalized experiences across digital properties at scale
Build engaging websites with intuitive web content management
Leverage a complete UI toolbox for web, mobile and desktop development
Build, protect and deploy apps across any platform and mobile device
Build mobile apps for iOS, Android and Windows Phone
Rapidly develop, manage and deploy business apps, delivered as SaaS in the cloud
Automate UI, load and performance testing for web, desktop and mobile
Host, deploy and scale Node.js, Java and .NET Core apps on premise or in the cloud
Optimize data integration with high-performance connectivity
Automate decision processes with a no-code business rules engine
Transform your businesses in order to survive in a completely digitized and connected world driven by software innovation.
Globally scale websites with innovative content management and infrastructure approaches
Content-focused web and mobile solution for empowering marketers
Faster, tailored mobile experiences for any device and data source
UX and app modernization to powerfully navigate today's digital landscape
Fuel agility with ever-ready applications, built in the cloud
In my last blog post, I pointed out the threats hackers pose to small businesses from a security standpoint.
This week has been a wild ride in terms of security breaches. First, I read an article on CSO Online that cited a report that found that a “typical Web application gets attacked 137 times in 59 separate days during a six-month period”, or more simply put: web applications are attacked about every three days. Scary stuff.
Next, a recent cyber attack on Mat Honan, senior writer for Gadget Lab from Wired, drove him to write, “In
the space of one hour, my entire digital life was destroyed.” He goes on to explain how our increasingly interconnected digital world makes it easy to gain access to lots of information - many times including sensitive information – very quickly.
Part of this problem was attributed to faulty security procedures at Amazon and Apple. They were quickly rectified, but not until after the damage was done.
From a security point of view, he recognized that access to his account information was simplified. “My accounts were daisy-chained together. Those security lapses are my fault, and I deeply, deeply regret them.” Unfortunately, it was after the fact.
Then he realized that he did not take steps to provide reliable backups. “Had I been regularly backing up the data…I wouldn’t have had to worry about losing more than a year’s worth of photos, covering the entire lifespan of my daughter, or documents and e-mails that I had stored in no other location.” Again, too late.
Mr. Honan’s horrific experience, explained in a 16 min video interview (well worth watching in its entirety, I might add), lets the viewer experience the shock, fear, frustration, paranoia, and helplessness that has plagued him since the event unfolded. After watching the video, one can’t help but feel, “Wow! I better do more to protect MY important stuff - right now!”
I encourage you to read the articles and watch the video to see how devastating this type of event can be on a personal level. Then, think about these two questions:
Make sure you have in place security solutions to physically separate and encrypt your data to protect it from hackers combined with reliability solutions that keep your business applications up and running with easy access to backups, regardless of the type of disaster. This model makes for a rock-solid “Disaster Recovery” plan.
Thanks and as always, please feel free to drop me a line and let me know what you think.
View all posts from Matt Cicciari on the Progress blog. Connect with us about all things application development and deployment, data integration and digital business.
Copyright © 2016, Progress Software Corporation and/or its subsidiaries or affiliates.
All Rights Reserved.
Progress, Telerik, and certain product names used herein are trademarks or registered trademarks of Progress Software Corporation and/or one of its subsidiaries or affiliates in the U.S. and/or other countries. See Trademarks or appropriate markings.