Glibc Ghost Vulnerability

On 1/27/2015 we were notified by our software vendors of a critical flaw in the Linux glibc library CVE-2015-0235 affecting all Centos, Redhat and Cloudlinux servers. After our vendors released OS patches we patched all servers immediately after. This includes all...

SoftLayer Certified Partner

We receive a number of phone calls and emails for requests for quotes and for proposals as a SoftLayer Certified Partner. One may ask what does a SoftLayer Certified Partner do? While SoftLayer has a variety of Certified Partners, Dynamic Net, Inc. is a SoftLayer...

Service Suspension

Have you ever taken a sales call where you absolutely knew you could solve the prospective customer’s pain for a reasonable investment (that in the long run would actually save them money), only to have them drop their mouth to the floor and complain your...

Hacker Attack Vectors

Repeat after me, “hackers most often target vulnerabilities, not specific people or companies.” Now, say that over and over again.. and shortly you should come to the conclusion that every single device and application typically has vulnerabilities which...

WordPress Brute Force Attacks

It is common for me to submit several hundred abuse reports as part of our security monitoring service every day. If I was asked for an off the cuff ball park of the main attack types from January 2012 to August 2012, I would probably answer with 40% remote file...

Shared, VPS, Dedicated, or Cloud

One of the common questions I hear from business stewards is, “How do I know what type of hosting to get? Will shared hosting be enough?” I also hear the variations of the above that often come in the form of, “my _______ told me I needed a dedicated...