cyberthreat

Cyberthreat Affecting 950 Million Mobile Devices

Cyberthreat vulnerabilities are everywhere. Cybersecurity firm Zimperium announced in July 2015 that it had discovered a major vulnerability in Google’s Android mobile operating system. The flaw potentially allows hackers to access approximately 95% of all Android smartphones and tablets. That adds up to around 950 million mobile devices that are at risk. A Uniquely Dangerous Cyberthreat Usually, hackers need their …

What Surveys Say about Moving to the Cloud

Cloud computing has surged in popularity. The 2015 Cloud Security Spotlight Report clearly makes this point. More than 70 percent of the 1,010 participants reported that they use or plan to use a cloud computing solution. Yet, some organisations are still apprehensive about using the cloud. Common Concerns Organisations hesitant about cloud computing are often concerned about: Security. Security is …

4 Steps for Creating a Business Continuity Plan

Developing strategies for business growth is a cornerstone of the modern organisation. Developing strategies to help avoid business loss is just as important, which means business continuity plans are critical. These documents provide detailed plans on how to keep essential operations running during an emergency in order to minimise losses. Some organisations call these documents “disaster recovery plans.” Others use …

Email Mistakes

5 tips on How to Spot a Malicious Email

5 tips on How to Spot a Malicious Email Email spam filtering is much better than it used to be.  For example with the anti-spam service I use I get maybe one spam email a week.   But no system is perfect and every now and then a malicious email will manage to slip into your inbox, so it’s critically important …

The Top Ten Tips to Protect Yourself from Malware

1. Do not open suspicious looking emails or click on URLs / hyperlinks in such mails. This cannot be stressed enough and is still a major reason for infection. If in doubt, delete! For businesses it is worth employing third party cloud-based email hygiene subscription services (such as our email software). These scan emails before they are delivered. They also offer features such as …

Protect your Personal Information

You hear about people’s hard earned money being defrauded every day and you may be scared that the same might happen to you. There are better ways to keep safe than to keep all your money hidden under your mattress. The best way to protect yourself is to protect all your personal information and keep it away from thugs. What …

Information Security Password strength is key

In today’s technologically driven business marketplace one of most often overlooked points of vulnerability to your business and personal information security is the strength or weakness of the passwords that you define for usage when logging into: your computer network, email provider, online banking, accounting or payroll applications. To underestimate the importance of strong passwords is to leave the door …

10 Tips for Disaster Recovery Planning

Last week South Africa experienced its worst load shedding since 2008 with R200m worth of lost revenue and damages to the country and businesses. Fortunately no one was killed or badly injured but more than 800 000 businesses were without power and most parts of the country looked more like a dead ghost town than a commercial area. With Generators catching fire and IT hardware becoming corrupt, a disaster recovery plan …

Internet usage policy

Why your company needs an Internet Policy

With computers and Internet access such an integral part of every business, and the Internet filled with everything from gambling to X-Rated websites, it is critical that every business has an Internet Use Policy in place. This policy can help prevent your employees from accidentally or intentionally causing harm to your company or your company’s reputation. While you don’t want …