Others
Synology Photos
How the Synology Photos app empowers users to safeguard and manage their photos
Smartphones have revolutionized photography, offering an accessible and convenient option for capturing life’s moments. However, the ease of smartphone photography has presented an ongoing challenge - the effective management of albums and storage. Thus, it is paramount for users to find a reliable solution for consistent organization and maintenance of photo albums. Synology Photos is an on-premise photo management solution designed to accommodate the needs of smartphone users, making it easy for them to store and organize their memories while their personal data remains fully private. However, on-premise photo management solutions often grapple with challenges such as power outages or
SDLSecurity
The efforts Synology made in pursuit of data security
Software vulnerabilities are among the most commonly exploited breaches by cybercriminals, from the SolarWinds attack impacting over 18,000 organizations to the Log4j vulnerability affecting over 48.3 percent of organizations globally. Vendors’ security risk management abilities are being challenged now more than ever before. When it comes to security risk management, incident response is usually the first thing that comes to mind. While it is crucial to have an incident response plan in place to address the aftermath of a breach, it is equally important to prioritize software security at the development stage to prevent such incidents from occurring in the
Network SecurityNetworkingSRMSynology RoutersWeb Privacy
How to secure your smart home with Synology Routers
Hundreds of thousands of users fall victim to cyberattacks and the situation is only going to get more complex, especially with the seemingly unstoppable rise of smart devices in our homes. With this in mind, we have put significant care into equipping Synology Router Manager (SRM) — the operating system that powers every Synology Router — with advanced network functionality that makes it simple to secure any type of network. In this article, we will explain how to protect your home network and the importance of network segmentation. The unseen risks Smart devices bring unprecedented convenience to households but may
Data ProtectionActive InsightBackupHyper BackupSecure SignInSecurity
Try these new tools to protect your IT this holiday
Work pressure and irregular staffing make holiday seasons the perfect occasion for threat actors. Besides direct attacks on your infrastructure, phishing and other scams targeting employees also take a flight in the weeks before Christmas. Routine maintenance becomes difficult with fewer hands to do the job. Add working from home to the mix, and it looks like you (sysadmin, reboot consultant, designated IT person) will be holding the fort this holiday. Do you have other plans for your holidays? Luckily, so do we. That’s why we’ve worked on some tools to make large deployments easier to manage and easier to
Data PrivacyEncryptionWeb Privacy
Data Privacy Day: one resolution for 2021
When it comes to keeping your personal information secure, don’t take anyone at their word — use encryption. Since the first Data Privacy Day back in 2007, online privacy threats have multiplied. On top of more traditional threats like phishing — which has been around since at least the early 1990s — users today face more sophisticated risks, including those linked to the widespread adoption of the Internet of Things (IoT). However, “older” threats remain highly relevant, as evidenced by a recent wave of ransomware attacks that not only lock user data but now have evolved to also threaten to leak
DSMSecuritySynology NAS
10 security tips to keep your data safe
The past years have seen a dramatic escalation in cybersecurity threats. According to a report by The New York Times, more than 200,000 organizations were attacked with ransomware in 2019, a 41% rise from the year before. To help you protect yourself, we’ve compiled a list of important data security settings that are often overlooked. At the end we’ve included bonus tips that could help you ensure data integrity -- another pillar of data protection. Note: Most of the settings listed below can only be accessed and modified by a user account with administrative rights. Tip 1: Disable the default
DoHNetwork SecurityWeb Privacy
DNS over HTTPS: things to consider when you go “private”
What it means for privacy, security, and parental controls, and whether there’s a way to have them all. The term “DNS over HTTPS (DoH)” has been hitting the headlines in the past month: Google announced its general availability in June, and in July, Mozilla was nominated for “2019 Internet Villains” by the UK Internet Services Providers’ Association (ISPA) for introducing DoH to Firefox (the nomination was later withdrawn due to a global outcry). This epitomizes how a new technology is disrupting existing implementations – but not just to ISPs and government agencies. Let’s take a look at what benefits DoH
IPSThreat Prevention
Building an intrusion prevention system for small businesses and homes
How a once enterprise-only technology was brought to Wi-Fi routers – and what challenges we have tackled. Once upon a time, we protected ourselves against cyber attacks by installing antivirus programs on computers. Then we entered the IoT era in which everything is connected – even baby monitors and video doorbells can be hacked. Tech-savvy users have long learned to set up firewall rules, but no matter how granular they are, the rules are static by nature. What if we can have automatic, network-wide protection that keeps itself up to date? This was the question we had in mind when
Security
Rolling out the welcome mat for white-hat hackers to enhance product security with Synology’s Bug Bounty Program
More and more enterprises are employing bug bounty programs to make their products and services more secure and reliable. The concept of this program is to crowdsource information security from researchers who report security vulnerabilities that may incur irretrievable damage and are previously unknown to potentially affected companies. Those who submit vulnerability reports which are later validated by security analysts can receive monetary rewards. This concept starts to gain ground, and the world’s tech giants, such as Microsoft, Google, and Facebook launched similar programs aimed at enlisting the help of researchers across the globe in finding out potential security flaws that