When speaking with business owners I’m often told they want to move their data into the cloud because it will be more secure than on-premise. Unfortunately, simply migrating to cloud storage does not always meet security expectations. Let’s use emails in the cloud as an example. Here are a couple of questions: Have you moved your
Posts Categorized / Uncategorized
The roll out of the National Broadband Network (NBN) is gaining momentum, with over 6 million homes and businesses now able to connect to the network via a mix of technologies. Alarmingly though, only slightly more than half that number of buildings have actually been connected. In other words, about 50% of occupants who could be
You should always consider your options. Reviewing your existing IT and telecommunications agreements are an example where before simply renewing them, you could save your business money and improve productivity. How simple is it to do this? 1: Decide what you want Write down some of the pros and cons of your existing service.
Notifiable Data Breach Laws Unless you have been living under a rock, by now you should have heard all about the new laws regarding reporting data breaches that went into effect back on February 22nd. This will probably change the way you do business going forward so what are some of the basics you
Does your firewall really work? Something that your IT people may not be telling you, or they simply may not know, is the very real fact that for many SME businesses, firewalls are not the trusted enforcer they once were. Not all firewalls are created equal and if you haven’t looked at this portion
Ransomware continues to be a vicious worldwide cyber threat, and with new strains created every day, there are no signs it will slow down. The potential to fall victim to cyber extortion is high, with no business, industry, device, or operating system safe from ransomware. The good news is everyone can be prepared for
Tech trends Small and Medium size businesses need to be aware of in 2018 At this time of year, the heading reflects the most common question I’m asked by small and medium business owners (SME) – and rightly so for a SME. Being aware of technology advancements could help your business realise 2018 as your
Why updating your server could fix a lot of problems You’ve probably heard your IT Provider advise you that your server should be replaced every 3-5 years, which seems pretty frequent, right? But trust us, there’s a method to this madness. Did you know that the cost of server support increases on an average of
Phishing is a way for hackers to gain protected information, tricking people into giving away bank credentials, social security numbers, passwords, and more. That’s why phishing emails are considered a main vehicle for identity theft. They look legitimate, and most people don’t realize it’s a scam until it’s too late. Phishing can be categorized in
How to strengthen the weak links in your IT security“ Shadow IT is the term used to describe IT systems that are built and used within businesses without explicit business approval. An example is an individual employee signing up for a cloud-based app without going through an approval process first. Why is this a problem?