The latest iTunes Scam has been reported. Malicious individuals are reportedly sending scam text messages claiming to be from Apple’s music service iTunes to a large number of people. The message is believed to claim the recipient’s iTunes account has been frozen and asks them to click on a link to ‘validate their [iTunes] account’. However, people who click on …
How to Stay Safe Online in 2016
Now that 2016 is well underway, you should review how well you protect your family and business computers, mobile devices and information in the new year. Being safe online is becoming more critical with more devices connecting online every day. Criminals are likely to redouble their efforts to make money by gaining unauthorised access to online banking details or other …
Password protection, is your password secure enough?
Password protection is essential to avoid hackers into your private and personal data. On Tuesday, the password-management company SplashData released its annual list of the most popular passwords of the past year. SplashData took a look at the more than 2 million passwords that got leaked last year, analyzing the most commonly leaked passwords and those that were least secure. Most …
How to Protect iPhones and iPads from Cyberattacks
Apple has built a solid reputation for producing secure mobile devices. Some of the tech giant’s customers believe that Apple products are so secure that they do not need to take any additional security measures. However, Apple’s mobile devices are not without their flaws. There are known vulnerabilities in the iOS operating system and in the devices’ built-in apps. Plus, …
Email Mistakes That Can Cause Serious Data Security Breaches
Email mistakes caused by careless human error is one of the main causes of IT mail problems. Many companies know how disastrous these mistakes can be. As the Ponemon Institute’s 2014 Cost of Data Breach Study pointed out, nearly one-third of all data breaches were caused by careless human error. Email mistakes in particular stand out as significant causes of …
Cyberthreat Affecting 950 Million Mobile Devices
Cyberthreat vulnerabilities are everywhere. Cybersecurity firm Zimperium announced in July 2015 that it had discovered a major vulnerability in Google’s Android mobile operating system. The flaw potentially allows hackers to access approximately 95% of all Android smartphones and tablets. That adds up to around 950 million mobile devices that are at risk. A Uniquely Dangerous Cyberthreat Usually, hackers need their …
Planning your 2016 IT Budget
Planning for success is nice in theory, but it’s hard for any business, especially in South Africa. Everyone knows the term “if you fail to plan, you plan to fail.” The reason everyone has heard that term before is because planning and budgeting is critical for business success. Here at Multi we believe an IT Budget can help save you …
5 tips on How to Spot a Malicious Email
5 tips on How to Spot a Malicious Email Email spam filtering is much better than it used to be. For example with the anti-spam service I use I get maybe one spam email a week. But no system is perfect and every now and then a malicious email will manage to slip into your inbox, so it’s critically important …
The Top Ten Tips to Protect Yourself from Malware
1. Do not open suspicious looking emails or click on URLs / hyperlinks in such mails. This cannot be stressed enough and is still a major reason for infection. If in doubt, delete! For businesses it is worth employing third party cloud-based email hygiene subscription services (such as our email software). These scan emails before they are delivered. They also offer features such as …
Protect your Personal Information
You hear about people’s hard earned money being defrauded every day and you may be scared that the same might happen to you. There are better ways to keep safe than to keep all your money hidden under your mattress. The best way to protect yourself is to protect all your personal information and keep it away from thugs. What …
5 Big Security Threats you could face in 2015
2014 was completely disastrous from a security point of view for companies and people alike. Apple’s iCloud breach saw private celebrity photos leaked, the most memorable security breach of 2014 was Sony Pictures who was thanks to a breach in Apple’s iCloud, Sony Pictures was the victim of it all but crippled the company and the public at large found itself …
Information Security Password strength is key
In today’s technologically driven business marketplace one of most often overlooked points of vulnerability to your business and personal information security is the strength or weakness of the passwords that you define for usage when logging into: your computer network, email provider, online banking, accounting or payroll applications. To underestimate the importance of strong passwords is to leave the door …