5 Ways to Secure & Protect Sensitive Data on Your Server

Related Quick Links Server security is vital to survival in today’s world. Securing Your Server and Protecting Valuable Data Protecting user and work data is a never-ending job. Configuring Hardware and Software Firewalls Configuring firewalls is an important step to protecting data on your server. Implementing Encrypted VPN for Remote Access VPNs can be used to secure connections to important servers. VPNs are a great way to secure the attack vector on open ports....

October 7, 2020 · 2 min · 214 words · Leah Erickson

How to Safely Wipe and Dispose of Broken Gadgets

But we’ve created a rough guide on what to do next when your gadget breaks. Avoiding Danger So, you’ve broken your gadget. (ensure you’re wearing closed-toed shoes!) The other majorly dangerous component in most modern electronics is the battery. If you have time, move it outside or onto a non-flammable surface. Try not to breathe if the battery is smoking or popping—it’s emitting dangerous gasses. If you’re able to’t put out the fire immediately or if it spreads, call emergency services....

October 7, 2020 · 2 min · 293 words · Roy Brown

Managing Permissions in SharePoint Online

With the ability to quickly share documents and information comes the need to easily manage permissions. SharePoint has a robust permission management system that can make securing either sections or entire sites easy to do. when you’ve got opened the Site sharing options pane, you will see a number of options. Most of these are self-explanatory from the screen itself, but they offer fast access to useful options. Many times system administrators or site administrators will turn off the allowing of access requests....

October 5, 2020 · 2 min · 228 words · Heather Wells

How to use an Azure SQL Managed Instance

Quick Links Microsoft SQL Server management is often a difficult and time-consuming task. To address challenges such as performance tuning, scalability, and updates, Microsoft introduced theAzure SQL Managed Instance. Azure SQL Managed Instances take the difficulty out of managing a SQL environment. It uses an evergreen Microsoft SQL, which always uses the latest version and features. SQL upgrades, patching, and security are fully managed and automated. High availability, disaster recovery, and automated backups make Managed SQL easy to administrator and use....

September 30, 2020 · 2 min · 382 words · Gloria Bradley

How to Create a Simple Bot In Microsoft Teams

These bots allow conversational and transactional capabilities to easily create more complex tasks. Beyond the actual coding of a bot to do useful tasks, implementing the infrastructure has been a challenge. In this article, we explore how to quickly get started using the Echo bot template. You will need to verify you have two providers registered for your subscription:Microsoft.Storageand Microsoft.BotService. These are located under your Subscription Resource Providers. However, if you exit out and reenter, it will most likely work....

September 29, 2020 · 1 min · 207 words · Karen Melton

Here's What to Do Before Recycling or Donating Your Gadgets

But there are a few things you should do first. UPDATE: 10/24/21 Verified content is up to date. There are also a few safety concerns with older devices, particularly the battery. But that tends to be handled by the recycler. This takes a few minutes, but it’s fairly reliable and very easy. You’ll want to confirm photos, videos, music, and text messages are saved. For phones, this means SIM cards and MicroSD cards (if your phone supports them)....

September 7, 2020 · 1 min · 169 words · Brendan Greer

How to Use Serverless Azure Functions

Quick Links In recent years, serverless has become one of the most talked-about technologies. You merely pick the language you want to write in, deploy the code, and consume the results. Provisioning Azure Function App First, navigate to “Function App” within the Azure Portal. Once there, choose the “Create Function App” button. Enter in the values that make the most sense for your environment and needs. In this example, we are going to use the PowerShell Core 7....

September 7, 2020 · 2 min · 261 words · Cody Jones

How to Use Terraform with CloudFlare

CloudFlare offers DNS services, security, and edge computing services that pair perfectly with the Terraform tool. Installing Terraform Terraform can be used either on Windows or on Linux. Windows Installation First, you will need todownload the Terraform executable for Windows. Once downloaded, place the executable in a Windows path location. This can be used to modify the systemPATHby changingUsertoMachine. You will need Administrative rights to do this. Linux Installation Much like Windows, you willdownload the latest release of Terraform....

September 3, 2020 · 2 min · 275 words · Carl Rodriguez

Using CloudFlare SSL/TLS Configurations

CloudFlare SSL/TLS Packages CloudFlare offers several different abilities. Just understanding which one will make the most sense for you is the first step. To mitigate this, you have a few options. These are subject to change but generally only have been added on over the years. It helps to secure a website from many different attack types. This should be used in conjunction with a regular SSL/TLS configuration. This is not perfect but does catch many inconsistent links....

September 2, 2020 · 1 min · 156 words · Stephen Peters

How to Use CloudFlare Workers and KV to Serve a Static Site

You will also need theWorkers Bundled plan, which offers the KV feature. The following features are available and where they differentiate from the free plan. Wrangler Command-Line Tool To create a site deployment, CloudFlare has created theWrangler command-line tool. Wrangler requires installation via eitherNPM (NodeJS package manager)orCargo (Rust language package manager). This will decrease the installation size. In this example, we are using the1.11.0version of Wrangler, which introduced a newer and easier authentication method....

September 1, 2020 · 1 min · 212 words · Omar Martin

How to Utilize DigitalOcean Load Balancers between Virtual Machines

Managing and maintaining a load balancer can often be a difficult task. What are the features of the DigitalOcean Load Balancer? A lot of options are available that can influence how well the load balancer works and performs. Load balancing does not work over different datacenter regions, so all Droplets must be located together. Next, we need to define the resources to add to the load balancer. After adding resources, it’s necessary to create all the traffic forwarding rules needed....

September 1, 2020 · 1 min · 173 words · Veronica Lewis

How to Utilize DigitalOcean Firewalls for your Droplets

Related Quick Links Firewalls are crucial for any server’s security. The firewall system is calledCloud Firewalls. Some of the features of Cloud Firewalls are: Recently, DigitalOcean releasedVirtual Private Cloud (VPC)networks. Cloud Firewalls work in conjunction with VPCs to further segment and protect traffic. In this example, it will be the IP address . Next, let’s take a look at the Outbound Rules. What you see below are the default rules....

August 31, 2020 · 1 min · 180 words · Karen Donaldson

Are Used Laptops Worth Buying?

Let’s break it down. Unfortunately, it isn’t. Now that’s not always the case. With a preponderance of resellers, the term “seller refurbished” has become common. The degree to which you trust the refurbished unit depends on who’s selling it. A refurbished laptop lets you trust your purchase … at least as much as you trust the seller. In general, we’d recommend at least 8GB of RAM if you want a Windows or Mac laptop....

August 27, 2020 · 2 min · 421 words · James Russell