HOSTING NEWS & TRENDS

Announcements and more from ReliableSite

Ransomware Attack on Community Medical Centers Healthcare Network: What Happened And How Could It Be Prevented?

Across the healthcare field, data security is a top priority. From HIPAA laws designed to secure sensitive patient data to other safeguards, healthcare facilities have a responsibility to keep them safe. Unfortunately, there is simply too much information to take advantage of in the healthcare field — and hackers are doing just that. At ReliableSite, we've frequently discussed the necessity of dedicated servers and other security safeguards in healthcare. While the industry has made some strides, there is still a severe need for change, which is apparent by recent healthcare data breaches affecting California's Community Medical Centers Healthcare (CMC) Network. What Happened at California's Community Medical Centers Healthcare Network? In October of 2021, CMC discovered a major data breach that compromised the data of more than 650,000 patients in their system. Consequently, this data breach forced CMC's communications systems offline for more than three weeks. It was later discovered that

Read more
The Dangers of Vishing — And How to Combat It

You might be familiar with ransomware attacks and phishing scams, both of which have become increasingly common in recent years. However, one type of attack that you may not have heard of is vishing. Unfortunately, vishing attacks have been on the rise in recent months — and more people are falling victim to them. What is vishing, and what are the dangers of this type of attack? What steps can you take to protect yourself? We've got all the answers to these questions and more below. What is Vishing? Even if you haven't explicitly heard the term "vishing" before, there's a good chance you already understand the concept. Specifically, vishing is an attack that aims to trick you into providing your personal/sensitive information to scammers over the phone. This could include anything from credit card and bank information to personal data, such as a Social Security number or a password.

Read more
New Artificial Intelligence from Microsoft and NVIDIA: How It Works

The technological advancements of artificial intelligence (AI) are transforming the digital and physical world. Today, we rely on AI more than ever – it’s in our homes, cars, laptops, factories, and just about anywhere else you can imagine. This ever-evolving technology continues to serve our changing needs. The newest advancement in AI from Microsoft and NVIDIA, MT-NLG, marks a massive development in the field. We will soon see the permanent implications of the technology on the digital world and the web hosting industry. About MT-NLG Technology Microsoft and NVIDIA introduced their new "Megatron-Turing Natural Language Generation" (MT-NLG) artificial intelligence model in October 2021. This new language model has 530 billion different parameters, making it by far the most advanced and complex AI model ever developed. For reference, the previously leading AI model, known as GPT-3, operates with 175 billion parameters.  Compared to past AI models, MT-NLG promises to offer unrivaled

Read more
Everything You Need to Know About Password Spraying Attacks

Sadly, there is no shortage of security threats lurking around the web. In fact, with new threats emerging seemingly daily, it can be challenging to keep up. One of the latest security risks to be aware of is the password spraying attack. This type of attack has become increasingly common in recent years – to the point that the Cybersecurity & Infrastructure Security Agency (CISA) issued advisories on this threat in 2022. What is Password Spraying? Specifically, a password spraying attack is a type of brute force attack involving picking one potential password and logging in across numerous accounts. This allows the attacker to try common passwords (such as default passwords often issued by third-party applications and programs) on an endless number of accounts without getting "locked out" for multiple failed login attempts. In a password spraying attack, one password may be used to access multiple accounts before the attacker

Read more
What to Know About PC BIOS Updates

Whether you enjoy online gaming or simply use your computer for work-related purposes, of course you want to keep it running as quickly and smoothly as possible. A big part of optimizing your computer's performance is installing updates and making upgrades as they become available. One part of a computer that many people don't realize they can update is its BIOS. By better understanding what a computer's BIOS is and what to consider when updating it, you can make a better-informed decision. What is BIOS on a Computer? Specifically, BIOS stands for Basic Input Output System. This system is stored on every computer's motherboard and is the very first system to run as soon as you turn your computer on. This chip plays an important role not only in powering your computer but in protecting it against security threats as well. Should You Update Your Computer's BIOS? A few years

Read more
How Did Microsoft Mitigate a Huge DDoS Attack?

No news is often good news in the cybersecurity world, so you rarely hear "success stories" related to DDoS attacks. However, DDoS attacks are thwarted on a fairly regular basis when the right security measures are in place. In fact, Microsoft reportedly stopped a huge DDoS attack in October 2021 that could have caused severe damage. Unfortunately for Microsoft, a host of security vulnerabilities continue to plague their cloud services, which is why more people are making the switch to dedicated hosting. More About the Attempted DDoS Attack Microsoft Azure’s cloud-based service was hit with an attempted DDoS attack in October of 2021. According to Microsoft, the size of this attack was massive – 2.4 terabits per second. This would make it the second-largest DDoS attack ever logged, according to Catalin Cimpanu of The Record. Microsoft reported that the attack came in a series of three waves across the span

Read more
Sinclair Broadcast Group Ransomware Attack: Top Takeaways for Server Security

Distributed denial of service (DDoS) attacks have been on the rise for years. Not only has the size and scope of these attacks grown, but they have been occurring with greater frequency as well. And unfortunately, it seems as though nobody is safe from these types of attacks and the havoc they can wreak. In fact, the Sinclair Broadcast Group was hit by a major DDoS attack in October of 2021, resulting in major network disruptions and data loss. More About the Sinclair Broadcast Group Attack The Sinclar Broadcast Group, which has headquarters in Maryland, operates dozens of television stations across the country. In October of 2021, the broadcast group's servers were reportedly hit by a huge DDoS attack that resulted in numerous network outages and technical issues across some of its TV stations. Likewise, some servers were hit with a ransomware attack that compromised some of the company's sensitive

Read more
Top Five Mistakes Modern eCommerce Site Owners Make

If you run an eCommerce brand, you rely heavily on your website to keep your company in business and profitable. Unfortunately, all it takes is one negative experience on your site to scare away potential customers, which can result in lost revenue. So, what are some of the most common mistakes eCommerce website owners make – and how can you avoid them? Let’s take a look. 1. Overlooking Security Think about it: You wouldn't feel comfortable submitting your credit card or other financial information on a site that didn't look secure. If you haven't taken time to beef up security on your eCommerce website (and make this obvious to your potential customers), you could be missing out on some serious sales. Make sure, for example, that you have a legitimate Secure Sockets Layer (SSL) certificate on your eCommerce site (and that it is clearly displayed for customers to see). 2.

Read more
The Importance of Mapping in a Data Backup Strategy

It's no secret that having a data backup strategy is more important than ever before, especially in the wake of increasing security threats online. However, one of the greatest challenges people and businesses face when developing a data backup strategy is simply knowing where their information is being stored. Enter data mapping. By having a solid understanding of what data mapping entails and how it can be used to improve your backup strategy, you can take the steps necessary to keep your information safe. What Is Data Mapping? Data mapping is a process that involves carefully identifying what information you have stored and where these files are located. Data mapping also refers to how long files and data may be held on certain systems before being moved elsewhere or deleted. Often, the process of mapping data involves sitting down with other members of your organization and listing out different types

Read more
The Value of Dedicated Hosting for Video Editing

Whether you're dabbling in video editing as a hobby or pursuing a career in the field, having access to a reliable server is a must. When it comes to video editing, there are two main hosting options to consider: cloud or shared servers and dedicated servers. In almost all cases, a dedicated hosting plan will be the better option for video editing. Once you understand the inherent limitations of cloud servers from a video editing standpoint and the benefits of dedicated hosting, you'll see why. Limitations of Cloud Servers for Video Editing There are many potential drawbacks of using a cloud or shared hosting plan for your video editing needs. For starters, video editing software tends to require a great deal of computing and processing power. Unfortunately, cloud and shared hosts cannot reliably deliver this performance, especially when your central processing unit (CPU) and other resources are shared with other

Read more