Copy
Is this email not displaying correctly?  View it in your browser
Hi <<First Name>> !

Welcome to the Touch Support Community Newsletter!  Summer is coming to a close for students heading back to school, but there's a lot happening here at Touch Support.  Let's drive right in!

SPOT ON SECURITY
HOW SECURE IS YOUR ENVIRONMENT?


As a thank you for being a part of Touch Support' Community, we're happy to assist you in making your server environment even more secure by providing a free security assessment.   

Head on over to http://www.touchsupport.com/security-scan/ to receive a free audit of your website or server security.  The best part (other than it's free)?  No password access is required. Our scan runs externally and doesn't require authenticated access to your website or server.

Whether you’re a website or server administrator, our security scan will help by highlighting potential vulnerabilities by performing over 900 remote security checks.

TECHNICIAN SPOTLIGHT
DION B.

We took a few moments to sit down and talk with Dion, one of our System Administrators, about what drives him on a daily basis.

WHAT KEEPS YOU WORKING TO HELP CUSTOMERS PAST THE END OF YOUR SHIFT?

The broad range of technology I'm exposed to.  Providing support for companies around the world allows me to troubleshoot various implementation that fulfill a common purpose.

WHAT DID YOU FIND MOST CHALLENGING ABOUT YOUR JOB?

Providing solutions in a timely manner for brand new applications and hardware that just hit the marketplace.  Learning is a constant component in the work that I do.

Thanks for your insight Dion!  (He's a bit shy so this was a BIG step for him!)

TECH TIP
LINUX SECURITY HARDENING


Although SSH is a secure way to connect to your server, there are two easy changes you can make that will further boost security. First, you probably don't want people logging in directly as root -- instead, they should login as a normal user, then use the "su" command to switch over. You can change this simply in the /etc/ssh/ssh_config file by adding the line:

PermitRootLogin no

Now, the only way to gain root privileges is through "su", which means crackers now need to break two passwords to obtain full access. While you are editing that file, find the line which says:

Protocol 2, 1

And change it to:

Protocol 2

This removes the option to fallback to the original SSH protocol, which is considered extremely vulnerable.

TECH TALK
IS CLOUD COMPUTING A SECURITY GAME CHANGER?
NOT SO FAST.


The adoption and move to a cloud platform in and of itself is not something particularly relevant or new to security concerns. Co-location of compute resources to third party ISPs or even internal hosting of sensitive information is nothing new. The cloud paradigm shift is merely meant to leverage compute density, flexibility and elasticity to maximize on CAPEX returns. Security …

Read more >

GET INVOLVED
WE'D LOVE TO HEAR FROM YOU


Submit your thoughts and feedback for a chance to win a free Starbucks gift card!

We've been busy establishing industry partnerships and developing software to further aid our mission of increasing customer satisfaction and more importantly -- your profitability.

To help guide our initiatives and optimize resources to our mutual benefit, click on the link below.  You'll receive a sneak peak of our ideas and be able to provide feedback on what's coming next.

The survey should take no more than a few minutes and we truly appreciate your participation.

THANKS FOR READING!

We'll look forward to hearing from you and filling you in on the latest news next month. We'd appreciate your feedback so feel free to get in touch with us via social media channels belo w.

Warm regards,
The Touch Support Team


  

Copyright © 2014 Touch Support, Inc., All rights reserved.


Email Marketing Powered by Mailchimp