Tag: private cloud

  • AWS had an outage this week that took out many top websites and is causing delivery issues for Amazon

    AWS had an outage this week that took out many top websites and is causing delivery issues for Amazon

    Amazon Web Services (AWS) is so prevalent in their cloud services they could be considered an internet backbone. Their cloud computing network is so ubiquitous with online web hosting it would be difficult to find a business that doesn’t utilize their service for some or all of their online hosting requirements.

    So, when an outage occurs on their networks the effects are far reaching and severe. This week’s outage lasted five hours and effected major players – such as Netflix, Southwest Airlines, the Associated Press, Delta and more. The outage mostly occurred on the east coast but even Amazon’s own e-commerce site was affected, which may cause delays in some deliveries as Christmas shopping is in full swing.

    This outage echo’s the Facebook outage that happened on October 4th  in that there is a ripple effect that occurs when these large providers have an outage. This instance is also similar in that, like with Facebook, there has been no word as of posting as to why yesterday’s outage even happened.

    The outage didn’t just affect big businesses either, many smaller businesses that utilize AWS for their company hosting found themselves locked out services necessary to complete their job duties. It points to the issues that can occur when all of our information is locked into just a few centralized places.

    When the internet was first established it was originally designed to be a decentralized network. No one business was meant to control most of it, that was so no single point failure could level it. Now “Big Tech” has eroded that goal and it will be difficult to undo the current state of things.

    It’s hard to argue though that AWS Isn’t a convenient service to use, they have streamlined the cloud computing process where many others have sought to make it convoluted for the end user, they have flexible payment options and it’s accessible on demand. When you compare it to Azure, who groups users under a domain (making it difficult to access the one you need) and is slower when it comes to large data transfers unless you have a premium subscription, it’s easy to see why many businesses choose AWS.

    Still, diversifying our networks would help protect us from outages such as these and major breaches. If you’re a business looking into cloud solutions, you might consider the Multicloud Redundancy approach.  What this means is you might have some of your data and services hosted by AWS and some hosted by another provider.

    Another option is hybrid cloud. Hybrid cloud is when you have a mixture of on premises storage (such as your office server), private cloud services and public cloud services (like AWS).

    Chart of cloud solution options
    Click to view the full size version.

    At Valley Techlogic we utilize AWS, but we also take the hybrid cloud approach. In fact, our backup program TechVault utilizes three different methods of storing your data. In this world of uncertainty when it comes to cybersecurity attacks and online outages that you have no control over, diversity is key.

    If you would like to learn more about TechVault or need help with your cloud service choices, reach out to us today.

    Looking for more to read? We suggest these other articles from our site.

    This article was powered by Valley TechLogic, IT service provider in Atwater, CA. You can find more information at https://www.valleytechlogic.com/ or on Facebook at https://www.facebook.com/valleytechlogic/ . Follow us on Twitter at https://x.com/valleytechlogic.

  • QSnatch Malware and the Safety of Network Attached Storage (NAS)

    QSnatch Malware and the Safety of Network Attached Storage (NAS)

    The QSnatch malware was first detected in October of last year, the goal of it appears to be in most cases to grab the credentials of the Network Attached Storage (NAS) it infects. It was also determined it has the capability to download further instructions from online servers, making it an extremely versatile malware.

    In October it was reported that 7000 devices had been infected with this malware, however recently it was confirmed by CISA that in June of 2020 that had jumped to 62,000 devices, making it clear this malware is now being used more prolifically. We also have learned more about its capabilities. That includes:

    • Credential scraper
    • SSH Backdoor – This allows the hacker to execute code on the device
    • Exfiltration – When run it allows QSnatch to steal a predetermined list of files
    • CGI Password Logger – This allows the malware to install a fake version of your device’s login page, allowing them to steal your credentials
    • Webshell functionality for remote access

    That seems like a scary list of abilities and makes it clear that enacting security measures in all your devices but especially those that contain important data is imperative.

    If you already use NAS you probably know the benefits, but for those that don’t or are considering it here is what’s beneficial about employing NAS devices in your organization:

    1. More storage space, in most cases NAS devices are used instead of or in addition to regular servers.
    2. Private cloud, a NAS device can be used to have a private cloud network in your business or even your home.
    3. Media Servers, there are many NAS devices especially aimed as functioning as a media server.
    4. Automated backups, a NAS device can function as your backup device or in addition to your primary backup device for more redundancy.
    5. Lower costs, NAS devices tend to be much cheaper than traditional servers.

    This is just a small list of the benefits but as with most devices there are specific measures required to keep them safe from a cyber-attack. This includes having a good plan for password security in your business – a hacker getting the password to one of these devices may be handing them the keys to the kingdom.

    Also, as the name implies this is “network” attached storage, so you must have a secure network in place. You also want to make sure you’re regularly updating the firmware for this and any other devices you use.

    Network attached storage devices are an excellent option for many businesses, as long as the proper protocols are followed to keep it safe.

    Looking for more to read? We suggest these tech articles from the last week.

    This article was powered by Valley TechLogic, an IT provider in Atwater, CA. You can find more information at https://www.valleytechlogic.com/ or on Facebook at https://www.facebook.com/valleytechlogic/ . Follow us on Twitter at https://x.com/valleytechlogic.

    Looking for IT Services in Fresno, Modesto, Stockton, Ceres, Atwater, Merced, Visalia or Lodi? We cover all these areas and more!