article thumbnail

Using Secure Configurations | Standardize Your Security

Linux Academy

Of course, I need to securely configure my devices. Ansible can help automate the backup, and you can learn more in this month’s how-to video that covers using Ansible to back up a Cisco ASA firewall. Don’t stop with the backup, though — we still need to monitor for changes. That goes without saying.

article thumbnail

CIOs Want To Know: Is Tape Making A Comeback?

The Accidental Successful CIO

This is why using magnetic tape as an offline backup system is starting to make so much sense to firms. More and more magnetic tape is starting to become part of a firm’s best-practice backup strategy. As with so many other things in the IT department, a CIO understands that a good backup strategy will have multiple layers to it.

Backup 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Is Information Security the Right Profession for Me?

Linux Academy

These controls could be firewalls, Security Information and Event Monitoring (SIEM) systems, Intrusion Prevention Systems (IPSs), Network Access Control (NAC) systems, etc. If you’re interested in becoming a Penetration Tester, a great place to start is with my CompTIA Pentest+ course. Incident Responder. Conclusion.

article thumbnail

Website Server Planning Tips

Galido

Redudancy and Backups. Do you plan on doing your own backups? Does the webhost provide automated backups and how often? How much storage for backups do they provide? As websites are commonly hacked and breached, backups, in addition to security, are an important element for deciding on which host to go with.

Backup 103
article thumbnail

User Account Review | Roadmap to Securing Your Infrastructure

Linux Academy

We spend so much time on other things — like managing firewall rules, system patching , analyzing report data, etc. Great news – as I’m writing this, I’m also working on a CompTIA CySA+ certification course here at Linux Academy to be released soon!). Data Backups. Identifying unused accounts. Patch Management.

article thumbnail

Phishing Attacks Are On The Rise: How Do You Protect Your Business?

Galido

Of course, you can’t rely on your employees to always get it right. There are several ways to this including doing data backups, securing your business network and computing devices with firewalls, antivirus tools etc. Training your employees and having the right policies in place isn’t foolproof. Final Remarks.

article thumbnail

Linux Academy Monthly Update – October

Linux Academy

Configuring Azure Storage for Backups . Backup and Recovery Using RSync . Securing a Virtual Network with Azure Firewall . Using Ansible Firewalls Rules. Completed Early Access Courses. That’s why we offer Early Access courses. Refreshed/Updated Courses. New Courses. Ansible Archiving.

Linux 13