Auditing Contact Data with Mautic

Mautic introduced a data auditing feature for integrations and users which is perfect for the Enterprise and SMB to find out who, what and when an Contact has been updated. Who moved my contact? Many companies work with multiple users editing and updating contact information, notes, and reminders. There are Continue Reading

CentOS Web Panel News

Enabling Brotli Compression on Nginx – Control WebPanel Wiki

Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers Continue Reading

Ubuntu updates to mitigate new Microarchitectural Data Sampling (MDS) vulnerabilities

Microarchitectural Data Sampling (MDS) describes a group of vulnerabilities (CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, and CVE-2019-11091) in various Intel microprocessors, which allow a malicious process to read various information from another process which is executing on the same CPU core. This occurs due to the use of various microarchitectural elements (buffers) within Continue Reading

MDaemon Technologies Announces New Email Security Gateway Services in the Cloud

The latest version 6.0 includes new cloud services, expanded Data Leak Prevention rules and integrated archiving features to help companies affordably protect user email. MDaemon Technologies announced the release of SecurityGateway for email servers version 6.0 that includes a new enterprise class Security Gateway cloud service and fully managed dedicated Continue Reading

IoT Security: Trickier Than You Think

In the new digital economy, access to data is critical. Meeting the shifting demands of consumers, monitoring and managing critical network and system components in real time, and creating algorithms to extract meaningful information from the Big Data these devices can generate are all necessary to compete in the new Continue Reading

CIPA Compliance and Cybersecurity: You Can’t Have One Without the Other

Cybersecurity measures are being adopted and fine-tuned across industries to ensure sensitive data is protected against cybercriminals and evolving attack vectors. However, some industries, such as education, are held more accountable for data protection than others. The federal government requires schools to have certain protective features in place under the Continue Reading

Update: Google and Microsoft Cases: Know Where Your Data Is!

All the way back in February (where has the time gone?) I posted a blog, Threats to your Data in the Trump Age, where I outlined possible threats to your data, including a recent ruling against Google and a Microsoft case that was still in the court system. In early Continue Reading

How Your Own People Pose a Threat to Financial Services Cybersecurity

Because financial services organizations are at an inherently greater risk due to the sensitive nature of the data they store, and the often-monetary motivations of cybercriminals, they are keenly aware of the damage that can result from a data breach. Data shows that the financial services sector was the most Continue Reading

Bringing Your Cloud Visibility Back Into Focus

Like data center sprawl, virtualization sprawl occurs when the numbers, locations, and functions of virtual machines distributed across a network grow to the point that they can no longer be managed effectively. As organizations continue to move applications and other core workloads into the cloud, virtualization sprawl can give way Continue Reading

If you’re not archiving your email, you should be!

When disaster strikes, is your business able to recover from data loss with minimal downtime? How does your business handle legal requests for discovery and compliance audits? Are you protected against data loss when employees leave the company? Businesses of all sizes worldwide rely on email for their day-to-day communication Continue Reading

>