Blog

Synchronized Security

BY IN Uncategorized Comments Off

With 83% of IT managers agreeing that cyber threats are getting harder to stop, it’s time to move from single point products to an inter- connected cybersecurity system. Synchronized Security enables your cybersecurity products to work together as a semi-automated, proactive system. It allows you uncover unknown threats, analyze incidents in real time, and respond

CONTINUE READING …

The Dangers Lurking In SMB Networks

BY IN Uncategorized Comments Off

The most significant risks to SMB’s don’t always come from threats with catchy names like Wanna Cry. Instead, the biggest threats can come from sources with names that are often more mundane like “Paula in Accounting” or “Dave in Purchasing.” That’s because the most acute cybersecurity risk in any organization comes from within. Yes, hackers

CONTINUE READING …

Cloud Security Myth Busted

BY IN Uncategorized Comments Off

When speaking with business owners I’m often told they want to move their data into the cloud because it will be more secure than on-premise. Unfortunately, simply migrating to cloud storage does not always meet security expectations. Let’s use emails in the cloud as an example. Here are a couple of questions: Have you moved your

CONTINUE READING …

NBN Copper Cut Off

BY IN Uncategorized Comments Off

The roll out of the National Broadband Network (NBN) is gaining momentum, with over 6 million homes and businesses now able to connect to the network via a mix of technologies. Alarmingly though, only slightly more than half that number of buildings have actually been connected. In other words, about 50% of occupants who could be

CONTINUE READING …

IT Support – Review before you renew

BY IN Uncategorized Comments Off

  You should always consider your options. Reviewing your existing IT and telecommunications agreements are an example where before simply renewing them, you could save your business money and improve productivity. How simple is it to do this? 1: Decide what you want Write down some of the pros and cons of your existing service.

CONTINUE READING …

Notifiable Data Breach Laws

BY IN Uncategorized Comments Off

  Notifiable Data Breach Laws Unless you have been living under a rock, by now you should have heard all about the new laws regarding reporting data breaches that went into effect back on February 22nd. This will probably change the way you do business going forward so what are some of the basics you

CONTINUE READING …

Firewalls – Are you really protected?

BY IN Uncategorized Comments Off

  Does your firewall really work? Something that your IT people may not be telling you, or they simply may not know, is the very real fact that for many SME businesses, firewalls are not the trusted enforcer they once were. Not all firewalls are created equal and if you haven’t looked at this portion

CONTINUE READING …

Combating the rise of cyber extortion

BY IN Uncategorized Comments Off

  Ransomware continues to be a vicious worldwide cyber threat, and with new strains created every day, there are no signs it will slow down. The potential to fall victim to cyber extortion is high, with no business, industry, device, or operating system safe from ransomware. The good news is everyone can be prepared for

CONTINUE READING …