Tag: Security
SurveillanceDeep Video AnalyticsSurveillance Station
How we’re supercharging video surveillance in 2022
Simply listing the new features in Surveillance Station 9.0 belies the magnitude of improvements to our video surveillance suite. As we release the ninth iteration of one of our signature products, we are proud to say that users large and small will find securing their premises an altogether more pleasant and integrated experience. In Surveillance Station 9.0, everything is simply more within reach. An all-new experience When you first access the new Surveillance Station, what you’ll immediately notice is the sleek dark interface. Adopting many users’ preferred look is one small way we are making monitoring a better experience, but
NASActive InsightBackupHyper BackupSecure SignIn
Try these new tools to protect your IT this holiday
Work pressure and irregular staffing make holiday seasons the perfect occasion for threat actors. Besides direct attacks on your infrastructure, phishing and other scams targeting employees also take a flight in the weeks before Christmas. Routine maintenance becomes difficult with fewer hands to do the job. Add working from home to the mix, and it looks like you (sysadmin, reboot consultant, designated IT person) will be holding the fort this holiday. Do you have other plans for your holidays? Luckily, so do we. That’s why we’ve worked on some tools to make large deployments easier to manage and easier to
NASDSMSynology NAS
10 security tips to keep your data safe
The past years have seen a dramatic escalation in cybersecurity threats. According to a report by The New York Times, more than 200,000 organizations were attacked with ransomware in 2019, a 41% rise from the year before. To help you protect yourself, we’ve compiled a list of important data security settings that are often overlooked. At the end we’ve included bonus tips that could help you ensure data integrity -- another pillar of data protection. Note: Most of the settings listed below can only be accessed and modified by a user account with administrative rights. Tip 1: Disable the default
Others
Rolling out the welcome mat for white-hat hackers to enhance product security with Synology’s Bug Bounty Program
More and more enterprises are employing bug bounty programs to make their products and services more secure and reliable. The concept of this program is to crowdsource information security from researchers who report security vulnerabilities that may incur irretrievable damage and are previously unknown to potentially affected companies. Those who submit vulnerability reports which are later validated by security analysts can receive monetary rewards. This concept starts to gain ground, and the world’s tech giants, such as Microsoft, Google, and Facebook launched similar programs aimed at enlisting the help of researchers across the globe in finding out potential security flaws that