The greatest threat to your organisation is sitting in the inboxes of your employees. Email is still the number one threat vector and a major weak link in your IT security. The truth of the matter is that many of us have become complacent and just want to get through the many emails that
When you hear the phrase "Disaster Recover" your are probably thinking of inhospitable environments or locations that suffer from extreme weather events. Did you know that most “Disaster” events occur from system failures, human error or cyber-attack? Your data is your most valuable assets and the loss of data can have a detrimental effect on
Essential Cybersecurity Toolkit
Making the Case for Cloud to Cloud Backup
From July of this year Google Chrome will mark all HTTP sites as ‘not secure’. This is according to Chrome security product manager Emily Schechter when writing in the Google Security Blog. Schechter writes that beginning in July 2018 with the release of Chrome 68, Chrome will mark all HTTP sites as “not secure”Google has
What is Meltdown and Spectre We’re only at the start of 2018 and already we have two security risks to contend with. Meltdown and Spectre are two security vulnerabilities discovered in modern microprocessor chips that may allow attackers to exploit the chips common features and puts your personal data, including passwords, at risk. People
STOP!! - Do you know where that USB stick or memory card came from? Was it delivered in the post? Did you simply find it on the ground and thought “What better way to establish who owns it then to plug it into my computer and see it the owner’s details are on it”.
By now I'm sure you've heard of the impending apocalypse known as GDPR. Or at least that's what some advisors would have you believe. In truth, a lot of it is interpretation. How much you change your business to achieve some semblance of compliance depends entirely on your unique set of circumstances. The important thing