Data Backup No Longer Simple

BY IN Uncategorized Comments Off

Data backup used to be much simpler; it happened locally and was always stored on a single device. Today, data backup occurs across multiple devices and platforms. In the event of an outage or breach, restoring any data from the company’s infrastructure in 2019 is considerably more complex. Today’s technology allows Small Medium Business (SMB)

CONTINUE READING …

BEC Attacks

BY IN Uncategorized Comments Off

BEC attacks – heard of them? One of the most prominent cybersecurity threats to SME business today is BEC attacks. Business Email Compromise (BEC) attacks are a successful method for bad actors to trick end users into exposing sensitive assets and other information. As is the case with many other tactics employed by hackers, BEC

CONTINUE READING …

Data Backup

BY IN Uncategorized Comments Off

Protect the data you need to thrive No matter which industry you operate in, data is at the heart of your business and that data is growing at an exponential rate. The IDC estimates that by 2025, 175 zettabytes of data will be created each year. To give you an idea of how large a

CONTINUE READING …

Synchronized Security

BY IN Uncategorized Comments Off

With 83% of IT managers agreeing that cyber threats are getting harder to stop, it’s time to move from single point products to an inter- connected cybersecurity system. Synchronized Security enables your cybersecurity products to work together as a semi-automated, proactive system. It allows you uncover unknown threats, analyze incidents in real time, and respond

CONTINUE READING …

The Dangers Lurking In SMB Networks

BY IN Uncategorized Comments Off

The most significant risks to SMB’s don’t always come from threats with catchy names like Wanna Cry. Instead, the biggest threats can come from sources with names that are often more mundane like “Paula in Accounting” or “Dave in Purchasing.” That’s because the most acute cybersecurity risk in any organization comes from within. Yes, hackers

CONTINUE READING …

Cloud Security Myth Busted

BY IN Uncategorized Comments Off

When speaking with business owners I’m often told they want to move their data into the cloud because it will be more secure than on-premise. Unfortunately, simply migrating to cloud storage does not always meet security expectations. Let’s use emails in the cloud as an example. Here are a couple of questions: Have you moved your

CONTINUE READING …

NBN Copper Cut Off

BY IN Uncategorized Comments Off

The roll out of the National Broadband Network (NBN) is gaining momentum, with over 6 million homes and businesses now able to connect to the network via a mix of technologies. Alarmingly though, only slightly more than half that number of buildings have actually been connected. In other words, about 50% of occupants who could be

CONTINUE READING …

IT Support – Review before you renew

BY IN Uncategorized Comments Off

  You should always consider your options. Reviewing your existing IT and telecommunications agreements are an example where before simply renewing them, you could save your business money and improve productivity. How simple is it to do this? 1: Decide what you want Write down some of the pros and cons of your existing service.

CONTINUE READING …

Notifiable Data Breach Laws

BY IN Uncategorized Comments Off

  Notifiable Data Breach Laws Unless you have been living under a rock, by now you should have heard all about the new laws regarding reporting data breaches that went into effect back on February 22nd. This will probably change the way you do business going forward so what are some of the basics you

CONTINUE READING …

Firewalls – Are you really protected?

BY IN Uncategorized Comments Off

  Does your firewall really work? Something that your IT people may not be telling you, or they simply may not know, is the very real fact that for many SME businesses, firewalls are not the trusted enforcer they once were. Not all firewalls are created equal and if you haven’t looked at this portion

CONTINUE READING …