Reset your Dropbox password

Reset your Dropbox password

Remember in 2012 when Dropbox’s data, which contained details of around two-thirds of its customers, were leaked? At the time, Dropbox reported that a collection of users’ email addresses had been stolen, but it wasn’t until recently that the company discovered that passwords had been stolen as well. So what does this mean for Dropbox users? Simple. You should reset …

Social engineering scams

4 Social engineering scams to watch out for

Every time we learn about a cyberattack that has affected so many businesses, we invest in security technologies that will safeguard our systems. This year, however, social engineering attacks have taken centre stage. Using various scams, hackers can circumvent network security systems by convincing gullible users into giving away sensitive information. Without knowing the most common social engineering exploits, your …

simple security measures

5 manageable and simple security measures

Don’t be put off by the tech jargon of security experts you find in forums and self-help books. A managed service provider is what you need to break down complex security ideas into easy-to-understand language. However, they generally focus on installing and managing protection software that’s often far too complicated to operate without their help. And when that’s the case, …

Hybrid cloud

SMBs turn to hybrid clouds for flexibility

Who would have guessed that clouds could be so complex? Yet in a day and age of seemingly continuous technological advances, “cloud” computing has become one of the more intricate and interesting approaches to managing IT resources for businesses. Not to mention one of the most cost effective, flexible, and secure, thanks in part to something known as the “hybrid …

Squarespace analytics for ecommerce

Better Squarespace analytics for eCommerce

There are quite a few content management systems (CMS) available for small and medium sized businesses to market themselves on the internet, all working to maximise the value of their features and eliminate gaps in service. One of these, Squarespace, has made a big splash with the addition of their Squarespace Analytics eCommerce functions. When choosing which CMS is right …

malware

8 signs your computer might be infected with malware

Anti-malware software plays an important role in the battle against cybercrime. However, it is not infallible. Cybercriminals are constantly releasing new malware programs or variants of existing ones, and it takes a while for anti-malware software companies to update their products to defend against them. So, even if you use anti-malware software, your computer might still get infected. It will …

Information Security Threats for 2017

Information security threats in 2017 will be more persistent and damaging than ever before. You need to be prepared for the unknown. This year could see an exponential rise in information security breaches that endanger the integrity and reputation of trusted organisations. The Information Security Forum, a global, independent information security body that focuses on cyber security and information risk …

5 Tips on How to Implement an Effective Cyber-Security Strategy for Finance

A Cyber-Security strategy is something that should be on the minds of every company’s executives. The threats to security are becoming increasingly complex, and the ability to stay one step ahead of those threats is more challenging than ever before. Multi IT & Telephony Solutions will now give you 5 tips on how ti implement an effective Cyber-Security strategy for …

Whale Phishing and how to protect yourself from it

Whale phishing is a phishing scam attack that targets the ‘big fish’ in an organisation; the senior executives and other people with access to highly valuable or sensitive information. The scam lures them to share valuable information or transfer funds into an account managed by the cybercriminal. Cybercriminals use spymail to gather important information about their ‘big fish’ before they …