linkedin  twitter  facebook  email-3

Step up your data security with MFA

Most often, a hacker doesn't want access to your data so they can use it for anything in particular.  They really only want access so they can stop YOU from accessing it. This loss of control on your part is what's most lucrative to them. If you want your access back, you need to pay up. It's as simple as that.

It's common knowledge that the best way to stay in control of your data is with strong password protection. Our post from earlier this year outlines the complexity you should factor in, but there's another layer of protection readily available to ensure hackers are as far removed from your data as they possibly can be: multi-factor authentication (MFA).

Read More →

Is your security baseline up to scratch?

Have you heard of the Australian Government's 'essential 8'? If you're responsible for IT in your business, then hopefully you have. But if you haven't, here's the short explanation...
The essential 8 has been developed by the Australian Signals Directorate arm of the Australian Government. It's purpose is to set a baseline 'standard' of cyber-security that businesses should have in place in order to minimize the risk of a data security breach.

Read More →

Keep ahead with password management

It's reasonable to assume a hacker is working for financial gain in some way, shape or form. I'm sure the last thing you want to do then is make it easy for them to earn a living at your expense - to access your data, encrypt it and then make you pay up before releasing it back to you.

Fortunately there's plenty you can do to make sure you don't become a victim. By establishing some password management standards in your business you'll definitely keep a step ahead.

Read More →

The dark web. What is it exactly?

You've no doubt heard the term 'dark web', but perhaps you're not sure exactly what it is? Our infographic below gives a simple explanation. But before you scroll down, keep the following in mind...

Read More →

BEC scams are big business in the Illawarra

Ever heard of a BEC scam? It's hitting the Illawarra and has the ability to cripple your business's cash flow if you and your team aren't alert. Watch my video to see how scammers are getting away with it.

Read More →

New data breach notification laws - do you have a plan?

In November 2017, HP researched 528 SMB's (10 - 99 employees) in Australia and found that 57% of them admitted to not undertaking any sort of IT security risk assessment in the last 12 months, despite a series of high profile breaches in that time. That's 57% of businesses that did not have any idea  as to how at risk their business was to a breach.

Read More →

Ransomware is everywhere

Our Business Continuity partner Datto recently published their annual State of the Channel Ransomware Report with findings that confirm Ransomware has truly become an unforgiving (and often costly) intrusion on SME's. And it's not going away any time soon.

Read More →

Security for your mobile team

 
For the purposes of this post, consider a mobile team to be anyone that can do any of the  following via any type of  mobile device (smartphones, tablets, laptops, PDA's and so on): 

 

Read More →

Why OneDrive, Dropbox & Google Drive aren't so good for business

When it comes to cloud storage for business, your security & productivity are paramount.
OneDrive, Dropbox, Google Drive & other similar cloud providers are affordable (often free) & easy to use, but dig a little deeper and you'll see where they fall down in these two key areas and can cause more harm than good for business users.

Read More →

Do you know the seven cybercrime threats to your business?

With cybercrime being such a lucrative business, it's no wonder a new threat pops up every other day. McAfee's 2014 report noted that the cybercrime industry is said to now be costing the global economy anywhere between $375b - $500b annually (& growing). 
Sadly the phenomenal amount of illegal activity this equates to can easily instill fear in any business owner, or person responsible for protecting business information.
To remain alert, it's important to understand the seven different types of cybercrime threats to your business - all of which fall under the term 'malware' - a digital threat.

Read More →