Deliver superior customer experiences with an AI-driven platform for creating and deploying cognitive chatbots
Deliver Awesome UI with the most complete toolboxes for .NET, Web and Mobile development
Automate UI, load and performance testing for web, desktop and mobile
A complete cloud platform for an app or your entire digital business
Detect and predict anomalies by automating machine learning to achieve higher asset uptime and maximized yield
Automate decision processes with a no-code business rules engine
Optimize data integration with high-performance connectivity
Connect to any cloud or on-premises data source using a standard interface
Build engaging multi-channel web and digital experiences with intuitive web content management
Personalize and optimize the customer experience across digital touchpoints
Build, protect and deploy apps across any platform and mobile device
Rapidly develop, manage and deploy business apps, delivered as SaaS in the cloud
In my last blog post, I pointed out the threats hackers pose to small businesses from a security standpoint.
This week has been a wild ride in terms of security breaches. First, I read an article on CSO Online that cited a report that found that a “typical Web application gets attacked 137 times in 59 separate days during a six-month period”, or more simply put: web applications are attacked about every three days. Scary stuff.
Next, a recent cyber attack on Mat Honan, senior writer for Gadget Lab from Wired, drove him to write, “In
the space of one hour, my entire digital life was destroyed.” He goes on to explain how our increasingly interconnected digital world makes it easy to gain access to lots of information - many times including sensitive information – very quickly.
Part of this problem was attributed to faulty security procedures at Amazon and Apple. They were quickly rectified, but not until after the damage was done.
From a security point of view, he recognized that access to his account information was simplified. “My accounts were daisy-chained together. Those security lapses are my fault, and I deeply, deeply regret them.” Unfortunately, it was after the fact.
Then he realized that he did not take steps to provide reliable backups. “Had I been regularly backing up the data…I wouldn’t have had to worry about losing more than a year’s worth of photos, covering the entire lifespan of my daughter, or documents and e-mails that I had stored in no other location.” Again, too late.
Mr. Honan’s horrific experience, explained in a 16 min video interview (well worth watching in its entirety, I might add), lets the viewer experience the shock, fear, frustration, paranoia, and helplessness that has plagued him since the event unfolded. After watching the video, one can’t help but feel, “Wow! I better do more to protect MY important stuff - right now!”
I encourage you to read the articles and watch the video to see how devastating this type of event can be on a personal level. Then, think about these two questions:
Make sure you have in place security solutions to physically separate and encrypt your data to protect it from hackers combined with reliability solutions that keep your business applications up and running with easy access to backups, regardless of the type of disaster. This model makes for a rock-solid “Disaster Recovery” plan.
Thanks and as always, please feel free to drop me a line and let me know what you think.
View all posts from Matt Cicciari on the Progress blog. Connect with us about all things application development and deployment, data integration and digital business.
Copyright © 2018 Progress Software Corporation and/or its subsidiaries or affiliates.
All Rights Reserved.
Progress, Telerik, and certain product names used herein are trademarks or registered trademarks of Progress Software Corporation and/or one of its subsidiaries or affiliates in the U.S. and/or other countries. See Trademarks for appropriate markings.