Running a small business takes an intelligent, resourceful person. From day one you must make important decisions in all areas of business, from the marketing strategy chosen for a product to the brand of printer you will use to print out flyers. One of the biggest decisions you will make in the early stages of a business involves your SMB’s …
Recognising a Social Engineering Attack
Cyber criminals no longer necessarily hack your accounts or infect your systems to steal your information. These days, they often trick you into making a mistake. This kind of attack is called social engineering, and your common sense is your most powerful defence against it. With this article you will be better equiped for recognising a social engineering attack. Let’s …
How to Enable Employees to Work Remotely
The ability for employees to work remotely has triggered significant workplace change. Some jobs are more suited to it than others – recruiters, engineers and writers, for example, are just some of the people finding it easy to work remotely. However, in some cases, entire business functions, such as call centres, are run with people working remotely, sometimes on the …
Cyber Security Self Assessment
With cyber threats making international news continually, we’ve all grown a bit weary and a bit tired of the topic but it doesn’t mean that the threat is going away, if anything it is getting worse. A Cyber Security Self Assessment may be the answer you are looking for to get a holistic idea of the current state of your …
Apple Provides Critical Update To Address Security Flaws in AirPort
The latest Apple Update for Security have been released by Apple for AirPort Base Station, their wi-fi enabled routers and devices. Affected models are AirPort Express, AirPort Extreme, and AirPort Time Capsule base stations with 802.11n and 802.11ac. In order to ensure the security of your personal information, I would recommend visiting the Apple security page for AirPort Base Station …
Ransomware warning
Computer users are advised not to click on links or open attachments in uninvited or unexpected emails and be wary about the websites they visit as security researchers identify hazardous new versions of ransomware. They should keep regular backups of important files and store the backups in a location away from a network. Ransomware is a type of malware that …
The Top 5 Reasons Why Your Business Needs a Strong Firewall
In this age of global connectivity, protecting your business’s assets and data is more important than ever. Almost all businesses are connected to the Internet for a wide variety of services. These include email, search, social media, and cloud storage. While much of this traffic is outbound, the fact is that the same Internet connection also allows inbound traffic. That …
How to Avoid Creating Weak Passwords
You have likely heard that using strong passwords is an integral part of protecting a company’s data. But do you know what makes a password strong or weak? To find out, here is a quick weak passwords quiz: Take a look at the list of passwords below. (The quotes are not part of the passwords.) Which of the following are …
5 Ways That Automation Can Save You Time
Automation of routine tasks with applications is more efficient than using manual tools. Yet most companies rely on manual tools, according to a ServiceNow survey. Eighty percent of the 915 surveyed managers reported that their companies still use manual tools and that those tools cause significant delays. On average, the managers said they spend two days every week using them to …
Insider Threats: How to Counter Internal Cybersecurity Risks
If you ask people about cybersecurity, they will probably start talking about hackers breaking into a company’s computers from hundreds of miles away. However, a threat just as destructive could be hiding inside that company’s offices. This is commonly referred to as insider threats. These insider threats typically fall into two groups. The first group consists of careless employees who …
The Advantages and Challenges of Using Wearables in the Workplace
In the past, wearable computing devices, commonly known as wearables, were primarily used for health purposes. Runners, for example, would use them to track their vital signs as well as the distances they ran. Products like Android Wear and Apple Watch, however, have pushed wearables out of the health niche and into popular culture. These devices are not limited to …
4 Reasons to Use a Cloud-based Data Backup Solution
A solid data backup plan can help your company survive catastrophic data loss. Both cloud-based and traditional in-house solutions can be used to back up data. However, cloud-based solutions have several notable advantages. Here are four reasons to use a cloud-based data backup solution: 1. Cost To implement an in-house data backup solution, your company must purchase all the required …