Code Reviews for Businesses

Are you a business using outsourced software development and you are not sure of the quality of the code being written? Concerned that the code quality won’t be able to support your growing business? Unsure whether the code is secure and following the regulations required for your business sector? Aykira can help you, we are Read more about Code Reviews for Businesses[…]

Pin It
Australian Privacy Policy

Privacy and Your Business, what are the risks?

Privacy is a big concern if you are running a business, regardless of size. All businesses need to keep sensitive information about their customers, staff, associations and potential customers – all of this will contain information that pertains to individuals which could cause them (and you) harm if illegal accessed or divulged. Further the ability Read more about Privacy and Your Business, what are the risks?[…]

Pin It

KRACK – Securing Your Wifi Network

Given the release of the KRACK vulnerability, it is becoming very clear you need to take additional steps to make your Wifi network more secure. You should take this as a wake up call to understanding the risks inherent with a Wifi network and just how easily it can be used to gain access into Read more about KRACK – Securing Your Wifi Network[…]

Pin It

User Authentication, you must do it right!

I must admit, one of my all time pet peeves is when engineers do not implement their user authentication service in the right way to be defendable against an attack. Take for the instance the recent hack against Zomato in which they had 6.6m hashed user passwords stolen. The real problem here is not that the Read more about User Authentication, you must do it right![…]

Pin It

Software Architect Security – what does defense by depth mean on the cloud?

According to a recent report – security looks to be a top concern among Software Architects. In this article I go into detail on one of the core ways in which you can achieve dependable security in evolving online systems – namely defense by depth. What is defense by depth? Simply put this is where one Read more about Software Architect Security – what does defense by depth mean on the cloud?[…]

Pin It
PII Hacking

What is PII Really?

PII (Personally Identifiable Information) broadly speaking is information that relates directly to the individual (you) and allows you to be individually identified, plus it is often of a sensitive private nature. We explain in this article what it is and how to protect yourself against people trying to steal your identity through PII. Why is Read more about What is PII Really?[…]

Pin It

Systems Architecture & Security, winning at both

Online systems need to be both secure and designed to last, so how can you achieve both and not blow the budget? This article covers a few simple principals you can adopt which are both good for your systems architecture and good for your security. #1 System Components should only do what they say on Read more about Systems Architecture & Security, winning at both[…]

Pin It

Online Security and Hungry Caterpillars – they have a lot in common…

Websites or online services come under constant attack from hackers using automated scripts, if left unmanaged such attacks can consume sufficient resources to impact your quality of service, negatively impacting your brand. This article explains why this is a major problem and what the solution is. Online Security Matters, Dictionary Attacks are everywhere Every online Read more about Online Security and Hungry Caterpillars – they have a lot in common…[…]

Pin It

Security and Architecture – always consider both together

Software or Systems architecture is often undertaken from a very technical point of view, the main concerns being around reducing technical complexity and dependencies to make it easier to deal with change in the long run. This is fine for ‘standalone systems’ but in today’s highly interconnected world – the boundary of a system is often Read more about Security and Architecture – always consider both together[…]

Pin It

Security Upgrades to Website Hosting

In response to attacks on WordPress sites worldwide that use 3 common plugins (which are often included in Commercial themes) we have been busy upgrading our website hosting to effectively guard against such attacks. We now provide as standard for all websites we host: Scanning every 30 minutes of web files looking for viruses, back-doors, Read more about Security Upgrades to Website Hosting[…]

Pin It

Common Security Mistakes That Business Website Owners Make & How to Avoid Them

Cybercriminals and Internet fraudsters are singling out e-commerce sites and blogs of small businesses for their unscrupulous attacks. Nevertheless, as a business website owner, you can enact some simple precautions to thwart the evil designs of these unwanted intruders. The “Fort Disco” Botnet’s Brute-Force Tactic Both small business networks, as well as, their websites are Read more about Common Security Mistakes That Business Website Owners Make & How to Avoid Them[…]

Pin It

The Importance of Website Loading Speed & Top 3 Factors That Limit Website Speed

The speed of your business website matters. Quick-loading websites perform better on every front: higher search ranking, superior user experience, and better user engagement. Most importantly, fast-loading websites deliver higher conversions and higher revenue. Slow Websites Hinder Mobile Traffic If you’re targeting mobile traffic and income (who isn’t), your website speed becomes even more critical. Read more about The Importance of Website Loading Speed & Top 3 Factors That Limit Website Speed[…]

Pin It

Online Security

Having an independent assessment of your online security can highlight security weaknesses. At Aykira we have the expertise to conduct in-depth security audits that you can use to harden your systems and reduce your business risks. We also have the skills base to remediate problems found. We consider it very important that your systems be Read more about Online Security[…]