Cyberthreat vulnerabilities are everywhere. Cybersecurity firm Zimperium announced in July 2015 that it had discovered a major vulnerability in Google’s Android mobile operating system. The flaw potentially allows hackers to access approximately 95% of all Android smartphones and tablets. That adds up to around 950 million mobile devices that are at risk. A Uniquely Dangerous Cyberthreat Usually, hackers need their …
Wired vs Wireless Networks: Which Is Better?
As a business owner, you likely need to connect your computers to the Internet. One way to do so is to set up a local area network (LAN). With a LAN, you can provide Internet service to computers located in a relatively small area, such as an office building. When deciding between Wired vs Wireless Networks here are a few …
Planning your 2016 IT Budget
Planning for success is nice in theory, but it’s hard for any business, especially in South Africa. Everyone knows the term “if you fail to plan, you plan to fail.” The reason everyone has heard that term before is because planning and budgeting is critical for business success. Here at Multi we believe an IT Budget can help save you …
What Surveys Say about Moving to the Cloud
Cloud computing has surged in popularity. The 2015 Cloud Security Spotlight Report clearly makes this point. More than 70 percent of the 1,010 participants reported that they use or plan to use a cloud computing solution. Yet, some organisations are still apprehensive about using the cloud. Common Concerns Organisations hesitant about cloud computing are often concerned about: Security. Security is …
4 Steps for Creating a Business Continuity Plan
Developing strategies for business growth is a cornerstone of the modern organisation. Developing strategies to help avoid business loss is just as important, which means business continuity plans are critical. These documents provide detailed plans on how to keep essential operations running during an emergency in order to minimise losses. Some organisations call these documents “disaster recovery plans.” Others use …
5 tips on How to Spot a Malicious Email
5 tips on How to Spot a Malicious Email Email spam filtering is much better than it used to be. For example with the anti-spam service I use I get maybe one spam email a week. But no system is perfect and every now and then a malicious email will manage to slip into your inbox, so it’s critically important …
The Top Ten Tips to Protect Yourself from Malware
1. Do not open suspicious looking emails or click on URLs / hyperlinks in such mails. This cannot be stressed enough and is still a major reason for infection. If in doubt, delete! For businesses it is worth employing third party cloud-based email hygiene subscription services (such as our email software). These scan emails before they are delivered. They also offer features such as …
Protect your Personal Information
You hear about people’s hard earned money being defrauded every day and you may be scared that the same might happen to you. There are better ways to keep safe than to keep all your money hidden under your mattress. The best way to protect yourself is to protect all your personal information and keep it away from thugs. What …
5 Big Security Threats you could face in 2015
2014 was completely disastrous from a security point of view for companies and people alike. Apple’s iCloud breach saw private celebrity photos leaked, the most memorable security breach of 2014 was Sony Pictures who was thanks to a breach in Apple’s iCloud, Sony Pictures was the victim of it all but crippled the company and the public at large found itself …
Information Security Password strength is key
In today’s technologically driven business marketplace one of most often overlooked points of vulnerability to your business and personal information security is the strength or weakness of the passwords that you define for usage when logging into: your computer network, email provider, online banking, accounting or payroll applications. To underestimate the importance of strong passwords is to leave the door …
10 Tips for Disaster Recovery Planning
Last week South Africa experienced its worst load shedding since 2008 with R200m worth of lost revenue and damages to the country and businesses. Fortunately no one was killed or badly injured but more than 800 000 businesses were without power and most parts of the country looked more like a dead ghost town than a commercial area. With Generators catching fire and IT hardware becoming corrupt, a disaster recovery plan …
Why your company needs an Internet Policy
With computers and Internet access such an integral part of every business, and the Internet filled with everything from gambling to X-Rated websites, it is critical that every business has an Internet Use Policy in place. This policy can help prevent your employees from accidentally or intentionally causing harm to your company or your company’s reputation. While you don’t want …