As owners of BMS, we are excited to announce that our company is in the process of merging with efex – a national technology services provider with a growing number of regional & metropolitan branches under it's umbrella. The BMS Group now represents efex’s Wollongong branch.
That's the first word that comes to mind when I look at these pictures. Even just a few short years ago I never would have thought something like this was possible in 2020.
What you can see here is our first training day with HP's Virtual Reality training platform.
With a combination of HP's VR hardware and their customized training software, our technical team are enabled to learn how to service & repair HP print devices without leaving our office.
Most often, a hacker doesn't want access to your data so they can use it for anything in particular. They really only want access so they can stop YOU from accessing it. This loss of control on your part is what's most lucrative to them. If you want your access back, you need to pay up. It's as simple as that.
It's common knowledge that the best way to stay in control of your data is with strong password protection. Our post from earlier this year outlines the complexity you should factor in, but there's another layer of protection readily available to ensure hackers are as far removed from your data as they possibly can be: multi-factor authentication (MFA).
Have you heard of the Australian Government's 'essential 8'? If you're responsible for IT in your business, then hopefully you have. But if you haven't, here's the short explanation...
The essential 8 has been developed by the Australian Signals Directorate arm of the Australian Government. It's purpose is to set a baseline 'standard' of cyber-security that businesses should have in place in order to minimize the risk of a data security breach.
It's reasonable to assume a hacker is working for financial gain in some way, shape or form. I'm sure the last thing you want to do then is make it easy for them to earn a living at your expense - to access your data, encrypt it and then make you pay up before releasing it back to you.
Fortunately there's plenty you can do to make sure you don't become a victim. By establishing some password management standards in your business you'll definitely keep a step ahead.
You've no doubt heard the term 'dark web', but perhaps you're not sure exactly what it is? Our infographic below gives a simple explanation. But before you scroll down, keep the following in mind...
If you're trying to get your head around the difference between back up & business continuity, it ultimately comes down to downtime. How much can your business tolerate?
We strongly recommend every SMB has business continuity in place. Traditional back up isn't enough anymore to protect against all the cyber-threats that continuously try to push their way into your business.
Of course there's a cost, but in the long run you have peace of mind knowing you won't be losing days, weeks or even months of data if your business gets hit. Imagine how costly that would be.
Cutting to the chase, if you choose to take your business down the cloud-based-email path, you're going to be paying for more than just email. The Office 365 cloud offering (o365) is subscription-based and bundles together the standard Microsoft suite of products you likely use every day - Outlook, Word, Powerpoint, Excel etc.