Posts Tagged ‘server security’

Difference Between Differential and Incremental Backup Strategies

Friday, December 6th, 2013

These days, the possibility of a cyber attack affecting your files – whether they are on a remote network or a local workstation – is no longer a matter of IF, but WHEN. You can keep your OS and softwares perfectly up to date and install the best anti-malware available, but you’re still not safe from hardware crashes and physical media corruption. If you really value your data, you need to have a regularly updated backup of your sensitive and mission-critical data.

However, regular backups can be time consuming especially if you have gigabytes of data to back up, which is especially made worse by the fact that large organizations will have accumulated terabytes of data throughout the years. With conventional methods of backing up files, the backup you have created will already be obsolete by the time you have finished, as new sets of data has probably already appeared. In order to solve this conundrum, there are so-called “smart” backups that save both time and disk space by only backing up modified and new files. There are currently two types of smart backups – Differential and Incremental.

The fundamental difference between differential and incremental backup strategies lie not in their overall efficiencies, as they are both viable strategies, but in their respective strengths and weaknesses. Choosing one over the other will depend on your needs and requirements as an organization, as well as your capabilities. But first, let us define the two backup strategies.

Click here to learn more about Prestige Technologies’ redundant security system. (more…)

Most Dangerous Website Vulnerabilities

Tuesday, September 10th, 2013

Most Dangerous Website VulneabilitiesAs more and more real-world functions and activities start to make their way to the web – from shopping, to socialization, and even work – the issue of web security becomes even more important. Websites spring up by the thousands every day, and technologies behind them get developed on an equally rapid velocity. HTML, Javascript, CSS, PHP, CGI, and other web standards continue to get developed. Security is always paramount, but as they get complex, certain vulnerabilities manage to creep up, resulting in vulnerabilities in the websites themselves. Here are the most dangerous of them:


Denial of Service


Denial of Service (DoS) is one of the most mainstream web vulnerabilities right now, thanks in part to the large number of Distributed Denial of Service Attacks launched against major websites (ranging from government websites to file sharing websites and even celebrity sites) these past few years.

DoS work by overwhelming a web server’s available system resources, such as CPU, disk space, memory, and bandwidth by flooding said server through the use of a single client flooding it, or multiple clients (through a botnet), which is termed as a Distributed Denial of Service Attack.

What makes DoS vulnerabilities especially dangerous is that it can be done even by people with limited technical knowledge (and in fact, there are hackers right now offering DDoS attacks for a fee).

Prestige Technologies has a redundant security system. Click here to know more. (more…)

With PRISM, It’s Now Up to Web Hosting Companies to Protect Its Customers

Tuesday, June 25th, 2013

Google has formally denied that it provides NSA a backdoor to its data but also admitted that it provided NSA information about its users in compliance with NSA’s request that was upheld by the court. Along with Google, Microsoft and other internet giants have all provided NSA with their data. Many critics have been questioning whether this move violates the right of people to privacy.

There is, however, a more interesting angle to all these. That is the fact that there little to no talk or buzz about the whole issue. No major new agency has put serious time into the issue and no one has clearly explained why.

The answer may be intertwined with how people perceive the internet, the cloud and their rights.


Everyone knows this is possible and probable


The government and the courts have been able to obtain confidential information phone calls, bank activities, properties and other confidential information about a person’s identity. That is not news. It has happened and will most likely continue happening for as long as there is reason for them to do so. NSA’s step was not unprecedented and won’t be the last. It’s not news.

The business world, particularly the stock market, seems to echo the sentiment that there is nothing to worry about.

Click here to know more about Prestige Technologies’ security features.

(more…)