Others
DSMSecuritySynology NAS
10 security tips to keep your data safe
The past years have seen a dramatic escalation in cybersecurity threats. According to a report by The New York Times, more than 200,000 organizations were attacked with ransomware in 2019, a 41% rise from the year before. To help you protect yourself, we’ve compiled a list of important data security settings that are often overlooked. At the end we’ve included bonus tips that could help you ensure data integrity -- another pillar of data protection. Note: Most of the settings listed below can only be accessed and modified by a user account with administrative rights. Tip 1: Disable the default
DoHNetwork SecurityWeb Privacy
DNS over HTTPS: things to consider when you go “private”
What it means for privacy, security, and parental controls, and whether there’s a way to have them all. The term “DNS over HTTPS (DoH)” has been hitting the headlines in the past month: Google announced its general availability in June, and in July, Mozilla was nominated for “2019 Internet Villains” by the UK Internet Services Providers’ Association (ISPA) for introducing DoH to Firefox (the nomination was later withdrawn due to a global outcry). This epitomizes how a new technology is disrupting existing implementations – but not just to ISPs and government agencies. Let’s take a look at what benefits DoH
IPSThreat Prevention
Building an intrusion prevention system for small businesses and homes
How a once enterprise-only technology was brought to Wi-Fi routers – and what challenges we have tackled. Once upon a time, we protected ourselves against cyber attacks by installing antivirus programs on computers. Then we entered the IoT era in which everything is connected – even baby monitors and video doorbells can be hacked. Tech-savvy users have long learned to set up firewall rules, but no matter how granular they are, the rules are static by nature. What if we can have automatic, network-wide protection that keeps itself up to date? This was the question we had in mind when
Security
Rolling out the welcome mat for white-hat hackers to enhance product security with Synology’s Bug Bounty Program
More and more enterprises are employing bug bounty programs to make their products and services more secure and reliable. The concept of this program is to crowdsource information security from researchers who report security vulnerabilities that may incur irretrievable damage and are previously unknown to potentially affected companies. Those who submit vulnerability reports which are later validated by security analysts can receive monetary rewards. This concept starts to gain ground, and the world’s tech giants, such as Microsoft, Google, and Facebook launched similar programs aimed at enlisting the help of researchers across the globe in finding out potential security flaws that
Deep Learning
Bring AI to your business with NAS
While I was investigating the amount of data being generated every minute back in 2017, Domo.com stated that 90% of the data in the world has been created in the last two years alone. This year “Data Never Sleeps 6.0” has estimated that by 2020 every person on earth will create 1.7 MB of data every second, that is, 12 PB per second in total. This is why worldwide spending on AI and cognitive systems will reach $77.6 billion in 2022, according to an IDC forecast. Businesses have to rely on AI services to help with data categorization. Various public