Remote Support : TeamViewer
TeamViewer is a compact module that runs on your computer and allows EVOK technical services to provide remote technical assistance

Dedicated server hosting is a secure, customizable hosting option for many sites. When you're ready to officially launch your company's website, you should investigate which type of site hosting would be perfect for your business needs.

The options are numerous. Not only in terms of the server companies themselves, but also in terms of the type of hosting you need.

The two most common hosting categories are shared hosting and dedicated server hosting. Here's why the latter might be the best choice for your small business.

Why is a dedicated server the right choice for your business?

First and foremost, you need to know that with a dedicated server, resource sharing is a thing of the past! You have full access to the server's resources, and web pages run without CPU or RAM congestion. Dedicated servers greatly reduce the risk of downtime.

What's more, a dedicated hosting provider guarantees high performance and maximum security. If your business runs smoothly with lots of traffic, dedicated servers are more reliable and stable than shared hosting. Certainly, shared hosting invites malicious websites and spammers to access your web page, while dedicated hosting enhances the security of sensitive transactions.

To remember:

Another very important point: unlike shared hosting, which will limit you to pre-loaded parameters, dedicated servers allow you to customize your offering according to your requirements, whether in terms of memory, storage space, etc. You have the choice to have total control, and that's what dedicated servers offer! At EVOK, we customize each vServer with additional memory, vCPU, SAN storage, without bandwidth limitation to meet your specific needs.

It's also worth noting that each server has a unique IP address, but a single IP address has multiple websites in shared hosting. As a result, spam sites push your site down because they're not managed properly. In contrast, dedicated sites offer unique IP addresses, widely used for e-commerce sites and secured by SSL.

Finally, and contrary to what you might think, dedicated server hosting remains a cost-effective way of accessing a complex application. In the long term, integrating your website into dedicated hosting lets you concentrate on what's important: your core business and, ultimately, your growth. A dedicated hosting service provider manages server construction and maintenance costs, and reduces corporate overheads.

How many times have you heard phrases like: "Your employees are the weak link in your cybersecurity ", "Employees are the major access point for cyber attacks ", etc.? You know, this doesn't have to be the case. On the contrary, your employees can be your company's greatest security asset. That is, of course, if you train them properly in cybersecurity policies and practices.

Find out how your employees can be the weakest link in your cybersecurity chain, and how you can turn them into your strength.

Contents :

The role of employees in corporate cybersecurity

Although companies in Switzerland and around the world are constantly protecting their data from hackers, the greatest cybersecurity threat remains the human factor. Indeed, human error is almost at the root of all reported data breaches.

Hackers target frontline employees and sometimes even the most diligent CEOs with highly sophisticated and often personalized attacks. For example, the company's LinkedIn profile and website contain a treasure trove for a spear-phishing attack. It's all there: e-mail addresses, domains, employee relationships and the CEO's agenda, for example.

These details make it easier for hackers to create a credible point of contact to exploit. For them, unsuspecting employees represent an easy target, but it's the keys they hold on the corporate network that are the ultimate objective.

These are just some of the reasons why the human factor threatens corporate security. In addition to phishing and social engineering, there are also viruses and malware such as ransomware, or the accidental loss of equipment used at work (telephone, computer).

Are employees really the weakest link in the cybersecurity chain?

Before taking any action, companies need to ensure that their employees are part of their cyber planning to strengthen their resilience.

All the evidence suggests that employees are always at the forefront of cybersecurity issues. However, it must be stressed that employees' lack of awareness of corporate security is the responsibility of the organization's culture. Because if you make your employees aware, they will be your most important line of defense.

How can you make your employees the driving force behind your cybersecurity?

1. Educate and train your employees

Do your employees know your company's cybersecurity policies? Are they familiar with password best practices? Do they have unique identifiers that they change regularly? Are they aware of the latest cyber threats, such as malware and phishing attempts? For example, do they know what to do when they receive an e-mail designed to look like their supervisor's? The first step is to raise employee awareness and provide ongoing training on cybersecurity issues.

2. Set up password policy

Employees often prefer simple passwords that they can easily remember, but this should not be practiced.

Implement 2FA authentication for an extra layer of protection. In addition, to ensure that employees generate or create strong passwords that even they can't remember, provide them with password management tools that allow them to store and quickly access their accounts with the added security feature. Also, it's not just about having strong passwords, but changing them frequently. Here's another step you can take to protect your company's security.

3. Use of data and the Internet

Ensure that clear rules are established when employees are connected to the company network. Establish policies that guarantee the protection of company data. Firstly, make it clear that business e-mails must only be used for work purposes, and that personal e-mails must be restricted.

Secondly, storage devices such as external hard drives or USB sticks should be prohibited, unless they are supplied and/or analyzed by the company.

In addition, unless it's necessary for work, you can restrict employee access to websites that aren't important, such as social networks or online video streaming. This will help employees avoid going to fraudulent websites that could potentially break into your network.

4. Invest in a security solution

Today, malicious software (malware) exploits advanced techniques to bypass network security tools and equipment. The effects on a company can be disastrous, especially if the malware is ransomware that locks your computer and prevents you from accessing it until you pay the ransom.

To guarantee your cybersecurity at the highest level, EVOK partners with several suppliers of the latest security equipment, including Palo Alto NetworksJuniper Networks and Fortinet.

Our certified staff are able to draw up a security strategy that reflects the constraints of your profession. Our equipment secures your applications, protects your identities, and detects and prevents advanced threats, even in encrypted traffic. They use cutting-edge technologies such as Machine Learning, which can detect variations in threats, predict the next stages of an attack, and implement protection in near-real time.

To remember

So keep in mind that all companies are potential targets for data breaches. Hackers don't care about your industry, sales or number of employees. They're only interested in the data you possess, and will stop at nothing to get their hands on it. That's why, as a company, it's incumbent on you to have a solid data confidentiality strategy, even when it comes to your employees.

As a website grows in popularity and the number of visitors increases, the resources available on a shared server can become limited. This can affect performance and user experience on your site in an era where user experience is becoming a crucial, if not defining, element. At this point, it becomes imperative to switch to a dedicated server.

With a dedicated server, you don't have to worry about your website's speed or potential downtime. However, choosing a dedicated server can be one of the most difficult decisions for a small business. Whatever your reasons for opting for dedicated server hosting, there are a few things you should look for in a provider.

Table of contents :

What is a dedicated server?

Dedicated server hosting essentially means that your website has its own server. It offers immense power and flexibility, but usually comes at a price. So it's important to do your research before opting for this type of plan.

For example, most websites start with a shared hosting plan, but quickly outgrow this cheap shared plan. You can then opt to upgrade to a virtual private server (VPS).

In general, a dedicated server can be used to host applications and/or services, as well as for data storage and backup services. You can also use an in-house dedicated server to host and provision specialized services, such as file servers or dedicated networks.

What should I look for in a dedicated server provider?

Are you planning to invest in a dedicated server in Switzerland in the near future? We advise you to consider these points before opting for a particular dedicated server provider.

1. The safety

In today's modern business world, security is and must be a key concern for companies in Switzerland. Indeed, when choosing a dedicated server provider, you should consider working only with suppliers who place a high priority on security. By choosing EVOK, you're opting for a provider who makes security a top priority. EVOK operates its services in Switzerland, with 3 datacenters 70 km apart, in a totally secure environment, enabling EVOK to provide full guarantees when hosting mission-critical applications on dedicated servers.

Your provider must also guarantee that it has the appropriate firewalls, intrusion management, malware and virus prevention measures in place at all times. These hosting providers must also have reliable spam filtering techniques to guarantee data security. Once again, EVOK protects you from all this with its business-class firewall clusters.

2. Technical assistance

Before choosing a dedicated server provider for your business, make sure they can offer technical support. A reliable dedicated server hosting provider should have a team available by phone and e-mail. This prevents your operations from coming to a sudden halt in the event of technical problems.

With EVOK, monitoring and maintenance of the entire network security infrastructure, datacenter and Hypervisior are included in the service. Depending on the version, maintenance and operation of the operating system as well as patch management and support for applications and services are also included.

3. State-of-the-art materials

When choosing a dedicated server supplier, it's a good idea to consider all the potential technological dynamics ahead. Your supplier should also have a wide variety of new hardware choices to meet your needs. In addition, make sure they have the hardware capacity to handle all your future growth objectives.

EVOK currently uses state-of-the-art processes in both storage and processors (VCPU). In fact, EVOK uses the fastest technology on the market, with a mix of SSD and Flash FMD (HybridFlash) disks. What's more, we base your virtual server on VMware ESX, using the latest generation of DELL Blade servers.

Social engineering is a term used to describe a wide range of malicious activities carried out through human interaction. It uses psychological manipulation to induce users to commit security errors or give out sensitive information.

By understanding social engineering attacks, and recognizing that true protection against them requires both people AND technology, you can protect your organization from the consequences of these types of practices.

Table of contents

What are the most common types of social engineering attack?

Here are some of the most common social engineering techniques:

Phishing

Phishing is the most common social engineering tactic.

This is done by means of an e-mail, a website, an Internet ad or a video to incite its victims to act. The people behind the attack may pose as a bank, delivery service or government agency, or they may be more specific and appear to come from a department within the victim's company (human resources, IT, sales...). By the way, phishing e-mails, which often look innocent, include a call to action. The victim will be asked to click on a URL, which will then take them to a fraudulent website containing malware.

Although even the most unsuspecting users are aware of this practice, it continues to wreak havoc. All the more so as cybercriminals are making much greater efforts to ensure that they are well-designed and unsuspected.

Phishing variants include Spear Phishing, which targets a specific demographic, such as employees of a particular company or CFOs in a particular industry. There's also Whaling, which targets executives or high-level employees.

Baiting

Baiting is another fairly common form of social engineering. It consists in luring the victim with a tempting offer (free music or games). The attacker hopes that the password used to log in and obtain the free digital gifts is a password used on larger sites. And if it's unique, the attacker will still be able to sell it on the dark web. In the corporate world, a baiting attack is most likely to consist of a USB key left in a common place. When someone finds it and plugs it into the company network to see who it belongs to, they download malware.

Pretexting

As its name suggests, "pretexting" is a form of social engineering in which the attacker presents a pretext to gain the victim's trust. The attacker may pose as an investor, HR representative or other "legitimate" source. This type of scenario generally plays on the victim's emotions, using a sense of urgency or the element of surprise.

How to counter social engineering?

To overcome social engineering threats, it is essential to focus on both the human and the hardware/software side.

Let's start with the human side, which is the point of attack for cyber criminals specializing in social engineering! With this in mind, security training remains the best way to avoid falling victim to an attack. As part of their security awareness programs, organizations should continue to remind their employees of the following common practices:

Let's move on to the technological side! It is imperative to :

And above all, keep up to date with all the latest developments in cybersecurity by becoming a regular reader of our blog ;-)!

Email accounts for over 90% of all business communications. These communications contain valuable business data such as contracts, purchase orders, invoices, presentations and so on. Because of the sensitivity and value of this content, companies have to comply with numerous regulations.

At the same time, companies are also facing other IT challenges due to the growth in messaging data. IT departments are struggling to meet ever-increasing storage requirements, while keeping their mail servers in optimum condition. The solution is simple: email archiving. But which tool should you choose? And what for?

In Switzerland, there are many reasons to implement an e-mail archiving solution. The main ones are: regulatory compliance, litigation cases, data preservation and intellectual property protection, mail server and storage optimization, mail server backup and disaster recovery
and finally monitoring the content of e-mail communications.

Why opt for mail archiving for your Microsoft Exchange?

Although Microsoft has taken a good first step towards implementing archiving for Exchange Server, the giant needs to further refine its functionality in order to execute archiving properly. Control over some of the functionality lies with the end-user, which is a major flaw in the implementation of archiving from a regulatory point of view.

1. Archiving limitations :

Users are responsible for managing their own archiving needs by moving e-mail from the main mailbox to the personal archive. However, it is up to the company to make decisions regarding archiving policy. Under no circumstances should end-users make decisions about which e-mails to archive and which to delete. Firstly, because users have to make discerning decisions for each e-mail, which takes time. Secondly, they risk deleting e-mails that should be saved. This defeats the purpose of archiving.

2. Limits on retention :

On Microsoft Exchange, users define their own retention rules. As messages move from the main mailbox to the personal archive, different rules may apply, such as moving messages after 90 days, moving messages to a subfolder of the personal archive after 180 days, or moving messages from a subfolder to deleted items after 180 days. Once again, when it comes to e-mail archiving, the company needs to draw up retention policies. Depending on government and industry regulations, a company must implement a company-wide retention policy. Not all users have the knowledge or understanding of the company's ever-changing regulatory requirements, and should not be tasked with deciding how long e-mails should be retained.

3. Uncontrollable storage growth

Microsoft Exchange was not designed for archiving. As a result, its ability to store large amounts of data and retrieve it quickly is quite limited. Using only single-instance, compression and deduplication technologies, Microsoft's archiving solution in no way minimizes or optimizes disk usage. The result? Your local disks are overloaded and you don't know where to store important e-mails.

Why choose EVOK for your email archiving?

As you may have gathered, Microsoft offers a wide range of powerful Microsoft 365 services, but a full backup of your 365 data is not one of them. By choosing a 365 backup solution from EVOK, you protect your Microsoft 365 from damage, enabling rapid recovery of deleted data.

Benefit from 100% restorable data

With fast, efficient data recovery, users can easily restore their data. A copy of the data is saved locally on a NAS or USB hard drive.

Move to clusters scalable from 50 GB to 3 TO or more

Our solutions are scalable according to your needs, thanks to the use of data storage on Hitachi SAN clusters.

Adopt AES 256 BITS encryption technology

For even greater protection, EVOK online backup encrypts all data using AES 256-bit encryption technology, making your data unreadable throughout the backup process. Only you know the encryption key that makes your documents readable.

Protect your data with military-grade encryption and 100% Swiss storage and replication

The primary objective of the archiving solution is to preserve e-mails. The gold standard for e-mail storage is that it must be court-approved. Thanks to 100% Swiss storage, we can guarantee you an e-mail archiving solution that will pass any industry audit and comply with all regulations.

EVOK Fribourg

Head Office - Altern8 SA
Rte des Daillettes 21
1700 Fribourg
Switzerland

EVOK Lausanne

Branch Office - Altern8 SA
Av. des Baumettes 7
1020 Renens
Switzerland

EVOK Genève

Branch Office - Altern8 SA
Grand-Rue 26
1204 Genève
Switzerland
ISO 27001 certification
This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.