Category: From Our Engineers

How to Handle a Data Breach

When a breach happens, how you proceed and the actions you take will help mitigate the impact to your bottom line. The type of information stolen generally dictates the seriousness of the entire situation. Back everything up fresh. Treat it like a police crime scene and preserve the evidence. Logfiles, configuration files, and affected data.… Read more »

How to Prevent Data Breaches

The question “How to prevent data breaches?” is similar to ‘how do you prevent car break-ins?’ Cars are still very easy to break into. Their windows are not made of steel. However, you can make the hassle and risk of breaking into the car outweigh their desire to get inside. Keeping money, valuables out of… Read more »

What is Hacking and How it Impacts You

The word “hack” gets used a lot these days and appears to have a few meanings. Every day in the news another organization announces they were hacked. A friend’s twitter account is hacked. Government systems are breached. What does it mean to be hacked? When used in terms of computer security, “Hack” means to gain… Read more »

Hybrid Cloud Usage Examples

The hybrid cloud approach benefits a lot of organizations, especially the larger they get. What are some specific use cases? Medical professionals HIPAA compliance is the privacy standard that all things medical have to adhere to in the United States. A hybrid approach allows separation of the sensitive medical data from the rest of daily operations,… Read more »

Why is Contegix an “Atlassian Expert”?

“DIY” is a great way to save money, but any cost savings come at the price of your lost time. Instead of dealing with your business, you are hammering away at system issues and the 3am support calls. Managed hosting is a good way to save time and money on your end if you can… Read more »

SHA-1: What it is and How it Affects You

In a fully expected move over 2 years in coming, the major browsers (Google Chrome, Mozilla Firefox, and Microsoft Edge) have announced they no longer support the SHA-1 cryptographic hashing algorithm, often used with SSL certificates. SSL Certificates are the piece in the web puzzle keeping everything secure, encrypting communications between a user and the… Read more »

Understanding A Very Bad Day on The Internet

As Alexander would say, today has been a Terrible, Horrible, No Good, Very Bad Day for the Internet. You’ve most likely heard about Distributed Denial of Service (DDoS) on the news in relation to a DDoS attack that has taken down a site or service for a period of time.   Fortunately, you’ve probably seldom… Read more »