Prioritising data backups with analytics

Prioritising data backups with analytics

The prevalence of digital data has become an integral part of life and business in modern times. Staggering amounts of data is generated every day and businesses have grown exponentially as they’ve found ways to monetise it. In fact, most experts agree that by the year 2020, there will be 1.7 terabytes of data generated per person on the planet. …

New Security features for Office 365

New Security features for Office 365

Office 365 has given business owners access to online organisational programs and collaboration tools for years. In an effort to become more user-friendly, Microsoft recently added new security features for Office 365, including two security upgrades and the addition of productivity tracking. Keep reading to find out more about Office 365’s new Azure Information Protection, Enterprise Mobile Device Management and …

Opera 41

Opera 41 for high browsing speed

The internet’s impact on people’s lives keeps growing by the day. People use the web for different reasons and access it any time, and the availability of smart gadgets makes it possible for the people to enjoy the internet from any location. However, the resourcefulness of the internet can be hindered by having a slow web browser. Fortunately, a modern …

Web Monitoring

How web monitoring increases productivity

The internet is undoubtedly one of the most powerful tools for improving business productivity. But it’s also a magnet for procrastination. With unfettered access to the internet, it’s easy to stray away from your important work responsibilities. If done in moderation, five-to-ten minute breaks on Facebook, Twitter, and YouTube are harmless, but if employees spend several hours a day there, …

Social engineering

Social engineering and cyber security

Social engineering is the ability to manipulate people into wilfully giving up their confidential information. The data varies, but in terms of cyber security this usually means passwords and bank information. Criminals are using social engineering to gain access to your business and its network by exploiting employees who often don’t have a clue about what is happening. Avoiding it …

Cyber Security Phrases

9 essential cyber security phrases

As with all technology, trendy phrases come and go with the passing of every IT conference and newly released virus. And when dealing with cyber security, keeping up with them all can mean the survival — or demise — of a business. If you’re looking for a list of the industry’s most relevant cyber security terms, you’ve come to the …

Reset your Dropbox password

Reset your Dropbox password

Remember in 2012 when Dropbox’s data, which contained details of around two-thirds of its customers, were leaked? At the time, Dropbox reported that a collection of users’ email addresses had been stolen, but it wasn’t until recently that the company discovered that passwords had been stolen as well. So what does this mean for Dropbox users? Simple. You should reset …

Social engineering scams

4 Social engineering scams to watch out for

Every time we learn about a cyberattack that has affected so many businesses, we invest in security technologies that will safeguard our systems. This year, however, social engineering attacks have taken centre stage. Using various scams, hackers can circumvent network security systems by convincing gullible users into giving away sensitive information. Without knowing the most common social engineering exploits, your …

Data

Do you speak “Data”?

Quick, what’s the most important thing about your business’s precious data? Besides knowing how to back it up properly and protect it from catastrophic loss, how about understanding all the lingo used to describe it? The term “big data” – in reference to large, complex data sets – is a well-known buzzword these days, but a slew of new “data” …