Let’s be honest, protecting yourself against Ransomware, in particular Cryptolocker is hard work. A solitary solution will not protect you, an integrated approach is needed to provide adequate cover. This includes activating Volume Shadow Copy on relevant PC’s, making regular … Read More

Looking to replace your network firewall? Whether you want to consolidate everything into a unified solution or add next-generation features, this guide is for you. It provides an overview of what to consider when selecting your next network firewall, including … Read More

By default, Microsoft Office 365 will expire your password every 90 days. It can come as a bit of a shock when you email stops working for the first time after using the Office 365 service and you don’t know why. … Read More

Simply put, they’re all fancy names for stuff you don’t want on your computer or to happen to you. 1. Virus: Any bad software used to be a virus; however, we use the term “malware” now. The word “virus” is used to … Read More

Cost and lost business associated with data breaches and lawsuits continue to increase every year. As long as valuable information exists, criminals will attempt to steal it using a wealth of traditional, as well as ever more sophisticated attacks. Traditional … Read More

Small and midsize organisations simply cannot afford to disregard security. Without it there’s more chance that new technology will face cyber attacks, which is likely to cost the business substantial amounts. What makes cloud computing so unique is its ability … Read More

We live in an open and connected digital world. IT Security doesn’t have to be unnecessarily restrictive. If you follow these tips, you’ll feel greater piece of mind to know you’re well protected. Security isn’t really that hard for the … Read More

Have you ever wondered what IT security breaches cost a small to medium business? We do, because assuring your IT systems availability and consistent performance is big part of what we do every day. From a small and medium sized business … Read More

USB Keys are an extremely convenient and cost effective method of transporting data. In the business space, they are often used is with professionals, managers and executives who take their work home. They transfer the files to a USB key, … Read More

When developing a security strategy, businesses must plan to protect against not just current threats, but all threats, known and unknown. Existing Security Threats don’t go away….Many businesses and end users remain susceptible to a myriad of known attacks due … Read More

1 2 3 4