Skip to main content

Posts

Is it safe to use SaaS?

 Now that you've seen some of the main benefits of SaaS, it's time to answer one of the main questions for companies: So, is it safe to use SaaS? It is a fact that choosing new tools for the job is no joke. Preserving company and customer data is of the utmost importance, so you need to ensure that your software is safe and reliable . And for that, it is not enough to rely on automatic pointing of Google's secure access. Once the information has become the company's equity, companies are increasingly willing (and concerned) to protect it from cyber attacks and misuse by employees. So, in the list below you can check the most important items to be evaluated when hiring this service model and find out if it is safe to use SaaS. 1. Verify that the vendor guarantees efficient authentications Migrating from an on-primis model to a SaaS does not have to put your operations at risk. Especially because companies that use cloud computing invest a lot in technology and qualified
Recent posts

Be proactive and prevent attacks

 There are steps you can take to prevent attacks on your network. We call it security layers. 1. Firewall The purpose of the firewall is to protect your network from external attacks. It is on the edge, at the end of the network, preventing all unauthorized IPs from entering. 2. IDS / IPS These two complement the work of the firewall. The IDS identifies any and all types of strange, unusual activity on the network. For example: an excessive download of files, after doing this it sends this alert information to IPS that will take the blocking actions of the Ips that are doing this type of excessive download.     3. Webfilter Not all attacks are external, in fact, there are many attacks that come from within your network. The role of the webfilter is to protect those who are within your network: computers, users with free access to move within your network. They can bring vulnerabilities to attacks. The webfilter manages what can or cannot be accessed by your machines, or users who are p

How to reassign a WAN port on a router

 To reassign the WAN port to the LAN on the router (for example, the TP-Link WR841N router), you need to go to the router's web interface: Go in your browser to 192.168.0.1 (or 192.168.1.1 or whatever address you set earlier) Login and password are standard (indicated on a sticker under the router) If you failed to log in through any of the above addresses, you can reset the router settings to factory defaults. To do this, on the switched on router, hold down the RESET button (located near the WAN port) and hold it for 7-8 seconds, then release it and wait for the device to reboot. After the reset, the router's web interface will be available at one of the addresses written above. Once you get into the router's web interface, make sure once again that after resetting the equipment to factory settings, you do not have the Internet. Nothing has changed, so go to the "Network" - "IPTV" section Change the mode from “Automatic” to “Bridge” A drop-down menu wi

Heating of segments of the Engineering market

 If you are interested in the area and want to be part of the team that promotes the development of the country, this profession can be ideal. Discover some of the possibilities: civil Engineering In recent years, the civil construction sector has experienced a spike in warming in the country. The real estate market has reaped the fruits of the intensification of the economy driven by the increase in the consumption of goods and services. With greater purchasing power, many people went in search of the dream of home ownership and, consequently, the construction of buildings skyrocketed. The car is also an indication of investment in quality of life that people tend to make as soon as they improve their financial conditions. The consequence? Traffic worsens in large urban centers. The solution? Works to widen runways, new routes, viaducts, walkways and construction of more public transport options. These are just some of the situations that welcome civil engineers. Professionals can sti

Tools that assist in Computer Engineering

 In a course like Computer Engineering, where technology is so present, we have several tools that can help both the undergraduate and the professional in their projects. For you to know a little more about them, I made a list with 4 of these tools. Thus, you can begin to familiarize yourself with the activities of this undergraduate course and also with the profession. Bizagi : is a software that provides tools to design business processes using the BPMN (Business Process Modeling Notation) standard. It makes it possible to know the best practices and the frequent errors in the modeling of processes, in addition to modeling, documenting and publishing the processes. StarUML : this software is capable of modeling various types of diagrams. You can draw flowcharts so that you can view all the processes that occur in a task sequence, for example. MySQL Workbench : visual database design tool. It integrates SQL development, administration, database design, creation and maintenance in a si

Get the necessary certificates for software engineer

 The next step in becoming a software engineer is to obtain a certificate for the programming languages ​​in which you are trained. Unfortunately, however, the field does not fully agree on the validity of the certificate. Some are considered obsolete, and some companies do not require them at all. As with other aspects of becoming a programmer, you will need to research what certain companies expect to decide if taking the certificate is worth your time. For example, say you want to work with a very specific application development company. Spend some time reviewing their job ads for software engineers. Do any of these positions require certifications ... and if so, which ones? This can give you a good basic idea of ​​whether you need to take additional certificates! if you do you need certificates, where can you get them? Certificates are offered through technology companies such as Microsoft and Oracle, or through professional organizations such as the IEEE. Getting a certificate us

Microsoft and cybersecurity companies have seen an increase in attacks

 In recent weeks, both Microsoft and cybersecurity companies have seen an increase in attacks on local Exchange servers. The target is a type of e-mail server most often used by small and medium-sized businesses, although larger organizations have also been affected. Microsoft recalls that the vulnerabilities were exploited in the beginning in state attacks, but over time, they have attracted the attention of other cybercrime organizations. The latter used them to spread new attacks, including ransomware . There is already talk of a large-scale attack, so protecting your systems is essential! Although Microsoft has regularly used methods to provide software updates, this extraordinary situation requires a more complex approach than applying updates. In addition to regular software updates, Microsoft also provides specific updates for older programs that are out of support, with the intent of providing quick protection. The use of the SD-WAN system is, therefore, an upgrade from outdat