Let’s be honest, protecting yourself against Ransomware, in particular Cryptolocker is hard work. A solitary solution will not protect you, an integrated approach is needed to provide adequate cover. This includes activating Volume Shadow Copy on relevant PC’s, making regular … Read More
How to: Choosing your next Firewall
Looking to replace your network firewall? Whether you want to consolidate everything into a unified solution or add next-generation features, this guide is for you. It provides an overview of what to consider when selecting your next network firewall, including … Read More
By default, Microsoft Office 365 will expire your password every 90 days. It can come as a bit of a shock when you email stops working for the first time after using the Office 365 service and you don’t know why. … Read More
Simply put, they’re all fancy names for stuff you don’t want on your computer or to happen to you. 1. Virus: Any bad software used to be a virus; however, we use the term “malware” now. The word “virus” is used to … Read More
Cost and lost business associated with data breaches and lawsuits continue to increase every year. As long as valuable information exists, criminals will attempt to steal it using a wealth of traditional, as well as ever more sophisticated attacks. Traditional … Read More
A secure cloud is definitely possible
Small and midsize organisations simply cannot afford to disregard security. Without it there’s more chance that new technology will face cyber attacks, which is likely to cost the business substantial amounts. What makes cloud computing so unique is its ability … Read More
Cost of IT security breaches to SMBs
Have you ever wondered what IT security breaches cost a small to medium business? We do, because assuring your IT systems availability and consistent performance is big part of what we do every day. From a small and medium sized business … Read More
USB Keys are an extremely convenient and cost effective method of transporting data. In the business space, they are often used is with professionals, managers and executives who take their work home. They transfer the files to a USB key, … Read More
Are you protected from today’s security threats?
When developing a security strategy, businesses must plan to protect against not just current threats, but all threats, known and unknown. Existing Security Threats don’t go away….Many businesses and end users remain susceptible to a myriad of known attacks due … Read More
Ryan Swindall at Accellion (a premier provider for secure mobile file sharing for enterprises) recently posted an article titled “IT – Thinking twice about the cost of free apps” (click on the title to read the post). The article highlights key trends … Read More