technology

secure private cloud

secure your private data as secure as enterprises – accessing a synology nas for private or small and medium-sized businesses

authentication

enable for admin and other sensitive accounts the 2-step verification – read more @multi-factor authentication

syn_2fa

dns

add some kind of dynamic dns service to access your changing public ip address like dyndns, changeip, strato, etc.

syn_dns.png

certificate

secure encrypted connection should mandatory, at least since edward snowden leaked information about “security” agency’s

  1. redirect traffic from http to encrypted https – be aware of public wifi, read more about ssl strip @attack vectors
  2. add a public trusted certificate to your system, letsencrypt.org provide free certificates – request via control panel at your synology

This slideshow requires JavaScript.

firewall

active port forwarding for vpn connection to your nas/vpn server

sync_port.png

vpn

to access private data from remote, configure devices vpn settings or download an app, enter you external ip address or full qualified domain

This slideshow requires JavaScript.

additionally you can add higher security if you authenticate via certificate from your device – read more @blog.centurio

profile

create a vpn profile in apple configurator with you account information and connection secret, send to your apple devices

syn_profile.png

we’re done

IMG_20180620_231411.jpg

 

technology

everything just cloud

from bad weather to increase productivity – pamphlet for the cloud

  • flexibility – easy to setup, scalable according to your requirements, highavailable
  • technology – hosted private or public, a mix of both as hybrid or as community cloud
  • security – encryption, access control, access rights, identity management

a service could be as secure or reliable as possible – it is all about trust

pictured from faz

cloud access security broker (casb) is state ot the art technology to utilize security where trust is missing, e.g. mobileiron access ensure secure access of trusted devices from mobile to cloud services

mobileIron access

general, innovation

better veil mit privacy

veil is a system to make private browsing more private – wang, an mit graduate student, said:

…the fundamental problem is that [the browser] collects this information, and then the browser does its best effort to fix it. But at the end of the day, no matter what the browser’s best effort is, it still collects it…

it doesn’t require any modification on the browser, because it doesn’t rely on browsers – a compiler can create a veil version of a site

mitveil was presented at the network and distributed systems security symposium or read at mit news  

general

then and now

smartphones changed the way we live, work and communicate, but not everything changed …

then
then

this survey gives a detailed inside about the usage of smartphone, feelings around mobile devices and the impact in surprising ways, read it here

thenandnow

many of us spend more than three hours a day on our phones

controversal – there is a unwritten etiquette guide of rules when not to use smartphone

never the less – working with mobile devices increase productivity while an emm system maintain the required security, some examples of thousands are:

lidl  claas   va