Blog List - Aegisys Cloud Solutions

SECURITY REPORTING We've designed our infrastructure and services for security, to protect our customers and their data. But if you discover a security vulnerability with any of our products, control panels, or other infrastructure, we want to

aegwebmaster January 31, 2022 0 Comments

Ransomware uses asymmetric encryption. This is cryptography that uses a pair of keys to encrypt and decrypt a file. The public-private pair of keys is uniquely generated by the attacker for the victim, with the private key

aegwebmaster January 31, 2022 0 Comments

Protect yourself from phishing Phishing (pronounced: fishing) is an attack that attempts to steal your money, or your identity, by getting you to reveal personal information -- such as credit card numbers, bank information, or passwords -- on websites that

aegwebmaster January 14, 2022 0 Comments

Choosing the wrong web hosting can slow down your website, cause security issues, and even crash your whole site! Plus, switching web hosts can be a hassle. That’s why it’s so important to make the right choice

With cyber attacks becoming the norm, it is more important than ever before to undertake regular vulnerability scans and penetration testing to identify vulnerabilities and ensure on a regular basis that the cyber controls are working.Geraint Williams, Senior Consultant

Critical Application Services - Service Level Guarantee (Advanced) ADDITIONAL DEFINED TERMS Some words used in these Critical Application Services - Service Level Guarantee (Advanced) have particular meanings: “Availability” and “Available” for purposes of the Production Platform Uptime

SECURITY PRACTICES. Aegisys is responsible for the security measures set out in the Agreement and shall maintain and implement the following technical and organizational measures in relation to the security of the Customer Configuration.1.1. Physical Security –

Version GTC13852 GVNG LAW CANAegisys Inc7-598 Falconbridge Road, Sudbury, Ontario, CanadaLast Revised: January 2021 THE HOSTING SERVICES AGREEMENTThe Hosting Services Agreement incorporates the following documents by reference: (i) the Service Description that describes the Services you are

The purpose of this Service Level Policy is to set forth the service levels at which Aegisys is to provide certain Services to Customer. Customer agrees that the remedies set out herein are the sole and exclusive

URL: Public Cloud Terms of Service (aegisys.com)© 2022 Aegisys Inc. – Global Product Terms – 13 May 2021 Revision – PCTOS # 6387 PUBLIC CLOUD PRODUCT TERMSCustomer’s use of the Aegisys Public Cloud Services is subject to and

  • 1
  • 2