<?xml version="1.0" encoding="UTF-8"?> 
<rss version="2.0"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
    xmlns:admin="http://webns.net/mvcb/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:content="http://purl.org/rss/1.0/modules/content/">
	<channel>
		<title>Bigstep Blog</title>
		<link>https://bigstep.com/blog/</link>
		<description><![CDATA[]]></description>
		<pubDate>Tue, 18 Jan 2022 16:15:00 +0200</pubDate>
		<language></language>
		<latestFuelVersion>1.4.13</latestFuelVersion>
	    <docs>http://blogs.law.harvard.edu/tech/rss</docs>
	
	    <dc:rights>Copyright 2022</dc:rights>
	    
	    		    		    <item>
				<title>How to protect your cPanel server from DDoS attacks</title>
				<link>https://bigstep.com/blog/how-to-protect-your-cpanel-server-from-ddos-attacks</link>
				<guid>https://bigstep.com/blog/how-to-protect-your-cpanel-server-from-ddos-attacks</guid>
				<pubDate>Tue, 18 Jan 2022 16:15:00 +0200</pubDate>
				<description><![CDATA[
				<p>Distributed Denial of Services attacks, or DDoS as they are commonly known as,&nbsp;are among the most common threats that can take a website or even an entire server offline. A present-day system administrator is expected not only to handle hardware or software issues, but also to have solid security skills and to be able to protect servers from attacks. If you administer your own WHM server, you will also benefit from the below article, in which we explore some simple methods to avoid downtime, using the free tools available in the <a href="https://bigstep.com/blog/cpanel-and-whm-learn-the-difference-on-bigstep-metal-cloud">WHM/cPanel</a> hosting platform.</p>		      	]]>
		      	</description>
		     </item>
		    		    <item>
				<title>What is the Log4j vulnerability and which are the latest updates?</title>
				<link>https://bigstep.com/blog/what-is-the-log4j-vulnerability-and-which-are-the-latest-updates</link>
				<guid>https://bigstep.com/blog/what-is-the-log4j-vulnerability-and-which-are-the-latest-updates</guid>
				<pubDate>Mon, 10 Jan 2022 11:00:00 +0200</pubDate>
				<description><![CDATA[
				<p>Log4j is developed by the Apache Foundation and it is a popular Java library used in a variety of consumer and enterprise services, websites, applications, and operational technology products. People are generally unaware of Log4j, since the software is used to record activities that go on under the hood in a wide range of computer systems.</p>

<p>In December, news arose that attackers started exploiting this obscure vulnerability, which created a wide global uproar due to its gravity, with CISA, FBI, NSA, and country-level cybersecurity authorities releasing a joint Cybersecurity Advisory. The Log4j vulnerability affects everything from the cloud to developer tools and security devices.</p>

<p>Below is a short history and description of why the vulnerability is so dangerous, as well as a timeline of news and different patches released since its discovery.</p>		      	]]>
		      	</description>
		     </item>
		    		    <item>
				<title>How to build an enterprise&#45;grade IT infrastructure in minutes while saving on costs in 2022</title>
				<link>https://bigstep.com/blog/build-an-enterprise-grade-it-infrastructure-in-minutes-and-save-on-costs</link>
				<guid>https://bigstep.com/blog/build-an-enterprise-grade-it-infrastructure-in-minutes-and-save-on-costs</guid>
				<pubDate>Wed, 15 Dec 2021 10:00:00 +0200</pubDate>
				<description><![CDATA[
				<p>2022 is just around the corner. What are your plans and goals in terms of your business’ IT infrastructure? Maybe you’d like to increase your infrastructure, hire new professionals, or lower business costs. The options are unlimited but you do need some knowledge before hopping on a digital transformation journey. Download our whitepaper below to find out how the future of IT looks like.</p>		      	]]>
		      	</description>
		     </item>
		    		    <item>
				<title>Video: Fostering Digital Transformation with Team&#45;as&#45;a&#45;Service</title>
				<link>https://bigstep.com/blog/video-fostering-digital-transformation-with-team-as-a-service</link>
				<guid>https://bigstep.com/blog/video-fostering-digital-transformation-with-team-as-a-service</guid>
				<pubDate>Thu, 09 Dec 2021 11:00:00 +0200</pubDate>
				<description><![CDATA[
				<p>November 10-11 marked the 10<sup>th</sup> anniversary edition of GoTech World, the largest IT &amp; Digital business event in Central &amp; Eastern Europe. We joined on the Business Transformation stage with a talk on fostering digital transformation with Team-as-a-Service and we are now sharing it with all of you.</p>		      	]]>
		      	</description>
		     </item>
		    		    <item>
				<title>Video: Improve Business&#45;Critical System Monitoring and Alerting</title>
				<link>https://bigstep.com/blog/video-improve-business-critical-system-monitoring-and-alerting</link>
				<guid>https://bigstep.com/blog/video-improve-business-critical-system-monitoring-and-alerting</guid>
				<pubDate>Mon, 06 Dec 2021 11:00:00 +0200</pubDate>
				<description><![CDATA[
				<p>October 13-14 marked the new hybrid edition of Big Data Week Online Conference, and we are proud to have&nbsp;joined as presenting partners. The event turned out a success and we are now sharing with you Bigstep’s talk on how to improve business-critical system monitoring and alerting on a bare metal server infrastructure.</p>		      	]]>
		      	</description>
		     </item>
		    		    <item>
				<title>Data at Rest, Data in Motion: How We Use Encryption</title>
				<link>https://bigstep.com/blog/data-at-rest-data-in-motion-how-we-use-encryption</link>
				<guid>https://bigstep.com/blog/data-at-rest-data-in-motion-how-we-use-encryption</guid>
				<pubDate>Wed, 24 Nov 2021 10:00:00 +0200</pubDate>
				<description><![CDATA[
				<p style="margin-bottom:.0001pt"><span style="line-height:normal"><span style="text-autospace:none"><span style="color:black">From chats to e-mails, encryption is a hot topic as people want to be able to send, receive, and store data as securely as possible. When we go on to discuss infrastructure services, encryption is a major aspect due to the importance of data integrity for companies, preventing data breaches, and protecting your organization from cyberattacks or unauthorized access. How do we use encryption at Bigstep on bare metal infrastructure as a service?</span></span></span></p>		      	]]>
		      	</description>
		     </item>
		    		    <item>
				<title>Join Us at GoTech World 2021 Online Conference</title>
				<link>https://bigstep.com/blog/join-us-at-gotech-world-2021-online-conference</link>
				<guid>https://bigstep.com/blog/join-us-at-gotech-world-2021-online-conference</guid>
				<pubDate>Tue, 09 Nov 2021 15:00:00 +0200</pubDate>
				<description><![CDATA[
				<p>This year marks the 10<sup>th</sup> anniversary of GoTech World Online Conference, and gathers top speakers and a global audience in a two-day event on November 10-11. Split between 8 content tracks, the conference focuses on different aspects of business, mindset, work, career, software and hardware solutions, digital projects, innovation, and more. Join us on the Business Transformation stage on November 11.</p>		      	]]>
		      	</description>
		     </item>
		    		    <item>
				<title>[People of Bigstep] George Bunea – “I treat any unexpected situation with calm and composure”</title>
				<link>https://bigstep.com/blog/people-of-bigstep-george-bunea-i-treat-any-unexpected-situation-with-calm-and-composure</link>
				<guid>https://bigstep.com/blog/people-of-bigstep-george-bunea-i-treat-any-unexpected-situation-with-calm-and-composure</guid>
				<pubDate>Thu, 04 Nov 2021 11:00:00 +0200</pubDate>
				<description><![CDATA[
				<p>George, Business Development at Bigstep, joined us this year with incredible energy and positivity. He is oftentimes the first person our new clients discuss with, so let’s learn more about his background, work habits, hobbies, and how he adapted to the new work environment.</p>		      	]]>
		      	</description>
		     </item>
		    		    <item>
				<title>Testing ELevate (new CentOS upgrade tool) on Bigstep Metal Cloud</title>
				<link>https://bigstep.com/blog/testing-elevate-on-bigstep-servers</link>
				<guid>https://bigstep.com/blog/testing-elevate-on-bigstep-servers</guid>
				<pubDate>Fri, 29 Oct 2021 11:30:00 +0300</pubDate>
				<description><![CDATA[
				<p>The developers&nbsp;of the AlmaLinux project have recently released a CentOS upgrade tool, named ELevate, that allows upgrades between RHEL-based distributions from 7.x to 8.x.&nbsp;In this blog post we will test it on Bigstep Metal Cloud, a bare metal dedicated server, and see if it works and can be used in a production environment.</p>		      	]]>
		      	</description>
		     </item>
		    		    <item>
				<title>Healthcare Database Management On Bare Metal Dedicated Servers</title>
				<link>https://bigstep.com/blog/healthcare-database-management-on-bare-metal-dedicated-servers</link>
				<guid>https://bigstep.com/blog/healthcare-database-management-on-bare-metal-dedicated-servers</guid>
				<pubDate>Tue, 26 Oct 2021 17:00:00 +0300</pubDate>
				<description><![CDATA[
				<p>A strong healthcare data management plan is needed when dealing with people’s sensitive medical data. This plan means everything from the infrastructure, database management, and of course backup.</p>

<p>Digitizing patient health records represents&nbsp;only one aspect; storing data, making use of the most performant databases, backing up, using a high performance&nbsp;server, and ensuring the security of that server are&nbsp;also crucial.</p>

<p>This is where bare metal dedicated servers shine, and can protect your medical institute against breaches and lawsuits.</p>		      	]]>
		      	</description>
		     </item>
		    	    	    
	</channel>
</rss>