Install the app
How to install the app on iOS

Follow along with the video below to see how to install our site as a web app on your home screen.

Note: This feature may not be available in some browsers.

News and Feeds

The latest news from and about Synology. *RSS feeds from official Synology site and other sites
  • Threads: 1,528
  • Messages: 3,264

Filter by prefix:

Lower the Attack Surface of a Synology NAS to Improve Security
When looking at Synology NAS security, most people are generally looking to harden the NAS itself. While that’s important, securing everything around the NAS is equally important, and potentially better. Disclosure: Some links below are affiliate links which means that I earn a percentage of each sale at no cost to you. Thank you for your […] Continue reading... - - - source: wundertech.net
AI-Driven Image Recognition Accuracy: Synology Enhances Enterprise Security Monitoring with Smarter Solutions
As surveillance image recognition technology matures, it not only strengthens internal security and protects vital physical assets, but also enables real-time incident detection and monitoring. In addition to theft and vandalism detection, AI can be used to analyze vast amounts of surveillance footage to produce useful insights such as crowd flow, vehicle identification, and occupancy […] Continue reading... - - - Source: blog.synology.com
A History of NAS Security Incidents – Deadbolt, Synolocker, Muhstik, eCh0raix and More
A History Lesson on NAS Security Incidents – STAY SAFE! As someone who has long relied on Network Attached Storage (NAS) devices for both personal and professional use, I’ve come to appreciate the convenience and functionality they offer. These devices provide a centralized and easily accessible repository for my important data, making them indispensable tools in my digital life. However, with this convenience comes a significant risk: the ever-present threat of cyberattacks. Over the past 15 years, we’ve seen numerous high-profile security incidents targeting NAS devices, underscoring the vulnerabilities inherent in these systems. In this article, I want to take a closer look at some of the most significant security breaches that...
The efforts Synology made in pursuit of data security
Software vulnerabilities are among the most commonly exploited breaches by cybercriminals, from the SolarWinds attack impacting over 18,000 organizations to the Log4j vulnerability affecting over 48.3 percent of organizations globally. Vendors’ security risk management abilities are being challenged now more than ever before. When it comes to security risk management, incident response is usually the […] Continue reading... - - - Source: blog.synology.com
Synology & QNAP NAS Remote Access Guide – Speed vs Security vs Cost
Accessing Your NAS Remotely – Security vs Speed vs Cost! Network Attached Storage (NAS) devices are an essential part of any home or office network. They provide a central storage location for all your digital files, making it easy to access and share them across multiple devices. However, connecting to a NAS device can be complicated, and choosing the right connectivity option can make all the difference in terms of speed and security. Continue reading... - - - Check out FREE NAS advice section on nascompares.com
How we’re protecting the privacy and security of your surveillance videos
Recent media attention has been drawn to issues surrounding privacy and security among security cameras, with a major vendor exposed to have glaring security flaws as well as not living up to their privacy claims. In this article I will clarify how our surveillance solutions ensure the privacy and security of your data. Your data […] Continue reading... - - - Source: blog.synology.com
Synology SRM 1.3 Software Review Part II – Safety & Security
Synology SRM 1.3 Review – General Security & Safety Regardless of whether you are a home or business user, the security of your network is going to be one of your priorities very early on. Both internal network security with the devices that are exchanging packets of data via the router, right the way to how the router governs and manages the stream of data coming from your internet connection, if a router isn’t particularly secure, you will all too quickly find out! Worse still, if you are an inexperienced network technology user or a business lacking in-house IT support, then the ease of configuring a router to be as secure as possible within your specific network environment is going to be even more of an uphill battle. SRM 1.3...
Synology DSM 7 vs TrueNAS Core – Security, Apps, Add ons and the Conclusion
Synology DSM vs TrueNAS – Security, Apps and the Verdict This is the 3rd and final part of my full comparison of Synology NAS DSM 7 and TrueNAS Core 12. If you missed the earlier chapters/parts, you can find them in the links below: Part I of the TrueNAS vs Synology DSM Guide is HERE (04/04/22 – Design, GUI and Customization) Part II of the TrueNAS vs Synology DSM Guide is HERE (06/04/22 – Storage Management, Access & Sharing) Alternatively, you can read the (LONG) Guide of Synology DSM 7 vs TrueNAS Core is available HERE. Now, if you read through my details on file/folder management on TrueNAS and Synology DSM, then you might have a good idea how this is going to go down when comparing these two platforms. However, it’s not quite...
Data Privacy Day just passed and with World Backup Day around the corner, we’ve prepared 10 data security tips to help you secure your Synology devices against online threats. The past years have seen a dramatic escalation in cybersecurity threats. According to a report by The New York Times, more than 200,000 organizations were attacked […] Continue reading... - - - Source: blog.synology.com

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Back
Top