Blog

Cloud Security Myth Busted

BY IN Uncategorized Comments Off

When speaking with business owners I’m often told they want to move their data into the cloud because it will be more secure than on-premise. Unfortunately, simply migrating to cloud storage does not always meet security expectations. Let’s use emails in the cloud as an example. Here are a couple of questions: Have you moved your

CONTINUE READING …

NBN Copper Cut Off

BY IN Uncategorized Comments Off

The roll out of the National Broadband Network (NBN) is gaining momentum, with over 6 million homes and businesses now able to connect to the network via a mix of technologies. Alarmingly though, only slightly more than half that number of buildings have actually been connected. In other words, about 50% of occupants who could be

CONTINUE READING …

IT Support – Review before you renew

BY IN Uncategorized Comments Off

  You should always consider your options. Reviewing your existing IT and telecommunications agreements are an example where before simply renewing them, you could save your business money and improve productivity. How simple is it to do this? 1: Decide what you want Write down some of the pros and cons of your existing service.

CONTINUE READING …

Notifiable Data Breach Laws

BY IN Uncategorized Comments Off

  Notifiable Data Breach Laws Unless you have been living under a rock, by now you should have heard all about the new laws regarding reporting data breaches that went into effect back on February 22nd. This will probably change the way you do business going forward so what are some of the basics you

CONTINUE READING …

Firewalls – Are you really protected?

BY IN Uncategorized Comments Off

  Does your firewall really work? Something that your IT people may not be telling you, or they simply may not know, is the very real fact that for many SME businesses, firewalls are not the trusted enforcer they once were. Not all firewalls are created equal and if you haven’t looked at this portion

CONTINUE READING …

Combating the rise of cyber extortion

BY IN Uncategorized Comments Off

  Ransomware continues to be a vicious worldwide cyber threat, and with new strains created every day, there are no signs it will slow down. The potential to fall victim to cyber extortion is high, with no business, industry, device, or operating system safe from ransomware. The good news is everyone can be prepared for

CONTINUE READING …

What is Phishing?

BY IN Uncategorized Comments Off

Phishing is a way for hackers to gain protected information, tricking people into giving away bank credentials, social security numbers, passwords, and more. That’s why phishing emails are considered a main vehicle for identity theft. They look legitimate, and most people don’t realize it’s a scam until it’s too late. Phishing can be categorized in

CONTINUE READING …

How to strengthen the weak links in your IT security

BY IN Uncategorized Comments Off

How to strengthen the weak links in your IT security“ Shadow IT is the term used to describe IT systems that are built and used within businesses without explicit business approval. An example is an individual employee signing up for a cloud-based app without going through an approval process first. Why is this a problem?

CONTINUE READING …