Tips for Managing MongoDB Remotely
Working remotely due to the Covid-19 pandemic means an increase in the importance of isolated infrastructures; more specifically ones that can only be accessed through an internal network, but in a way that authorized people...
GDPR and Database Backups
‘Right to be Forgotten’, Article 17 in the EU General Data Protection Regulation (GDPR) talks about how a data subject has the right to request to remove it from any system. The owner of the...
Setting up ClusterControl as a Bastion Host for your Database Servers
A bastion host is a gateway host between an inside network and an outside network. It is commonly used to access remote hosts sitting on a different network which has no direct connection between the...
My DBA is Sick – Database User Management Tips for SysAdmins
User management is one of the day-to-day tasks that are performed by database administrators. If your database administrator is not available and you have been appointed to perform his tasks, you may have been asked...
My DBA is Sick – Database Security Tips for SysAdmins
The day happened when your database administrator did not show up on the daily online standup. Shortly after you have learned that he’ll be unavailable for an unknown period of time and it is you,...
Multi-DC PostgreSQL: Setting Up a Standby Node at a Different Geo-Location Over a VPN
Previously, we wrote about Setting Up a Geo-Distributed Database Cluster Using MySQL Replication. This time, it's about PostgreSQL. Setting up a geo-distributed cluster for PostgreSQL is not a new concept and the topology is quite...
An Overview of Client-Side Field Level Encryption in MongoDB
Data often requires high end security on nearly every level of the data transaction so as to meet security policies, compliance, and government regulations. Organization reputation may be wrecked if there is unauthorized access to...
How to Protect Your MySQL & MariaDB Database Against Cyberattacks When on a Public Network
It is sometimes inevitable to run MySQL database servers on a public or exposed network. This is a common setup in a shared hosting environment, where a server is configured with multiple services and often...
How to Protect your MySQL or MariaDB Database From SQL Injection: Part Two
In the first part of this blog we described how ProxySQL can be used to block incoming queries that were deemed dangerous. As you saw in that blog, achieving this is very easy. This is...
How to Protect your MySQL or MariaDB Database From SQL Injection: Part One
Security is one of the most important elements of the properly designed database environment. There are numerous attack vectors used with SQL injection being probably the most popular one. You can design layers of defence...
Is My Database Vulnerable to Attack? A Security Checklist
Data is probably the most important asset in a company, so you should make sure your database is secured to avoid any possible data theft. It’s hard to create an environment that is 100% secure,...
Database Backups 101: Database Backup Security Considerations
Data security is important to protect the data in an organisation from unauthorised access, malicious attacks, or phishing activities. The term database security includes the methods taken to protect the security breach from the data...