Data centre security

How secure is a data centre?

 

When people talk about how secure cloud services are, they usually focus on issues such as data protection and defence against cyber-attacks. A major fire at a French cloud provider in early March raised the question of how well Internet data centres are protected against...

 

Microsoft Exchange Zero Day Attack

Microsoft Exchange Zero Day Attack

 

On March 6, Microsoft pointed out vulnerabilities in the Microsoft Exchange software. IONOS had already learned of the vulnerability on March 3 and immediately applied updates provided by Microsoft to all Exchange systems it operated itself in order to eliminate the...

 

Data centre security

How secure is a data centre?

When people talk about how secure cloud services are, they usually focus on issues such as data protection and defence against cyber-attacks. A major fire at a French cloud provider in early March raised the question of how well Internet data centres are protected against physical threats such as fire. What should cloud users bear in mind when choosing their provider and is there anything they can...

Microsoft Exchange Zero Day Attack

Microsoft Exchange Zero Day Attack

On March 6, Microsoft pointed out vulnerabilities in the Microsoft Exchange software. IONOS had already learned of the vulnerability on March 3 and immediately applied updates provided by Microsoft to all Exchange systems it operated itself in order to eliminate the vulnerabilities. IONOS systems were not affected by the attack wave.

What is IAM (Identity and Access Management)?

IAM – What is Identity and Access Management?

In any system based on user accounts, Identity and Access Management has a role to play. So does every application use IAM? How important are Identity and Access Management systems when it comes to corporate compliance? And what features do these systems offer?

What is credential stuffing?

Credential stuffing: how security leaks become a data sieve

There are billions of stolen logins circulating on the dark web today. Hackers use these combinations of logins and passwords to break into user accounts and steal sensitive data using a technique known as ‘credential stuffing’. To protect your data, you need to know how credential stuffing works and what countermeasures you can take to protect yourself.

Ping of death

Ping of death

The ping of death was a cause for alarm in the early days of the Internet: A malicious hacker could cause a remote system to crash with a simple ping command. Keep reading to find out how the attack works on a technical level and why you don’t have to worry about it today.

Ping flood

Ping flood

The ping flood is a type of denial-of-service attack that can affect commercial providers and home users alike. This attack relies on the ICMP protocol and the ping command. In order to unleash a particularly powerful flood, attackers often use a network of bots. Learn how the ping flood works and how you can protect yourself from one.

Comparison of the best antivirus programmes

Antivirus software: Which software is best?

Antivirus software has sadly become indispensable as new types of threats against your system emerge regularly. Viruses, worms, Trojan horses, and many other types of malware threaten to infect your system and could cause significant damage. To counteract these threats, software makers try to fight off malware attacks with intelligent antivirus programs. Find out which rank top in our antivirus...

What is a backup?

What is a backup and how does it effectively protect your data?

Technical issues, hacker attacks, and malware can lead to costly and serious data loss at any time. To minimise the risks, it is recommended that you perform regular comprehensive backups. It is important to have a suitable backup strategy that properly meets your specific requirements.

Turning off the Windows firewall

How to turn off the Windows firewall

Among other things, Windows includes a built-in firewall that protects your device from attacks by hackers and unwanted network traffic. To ensure you can use the Internet safely, you shouldn’t turn off the firewall permanently. However, you may sometimes find you need to temporarily disable it, for example, to install software. Read on to find out how to do this.


Wait! We’ve got something for you!
Get your .co.uk domain for just £1/1st year.

Enter the web address of your choice in the search bar to check its availability.
12 months for £1
then £10/year