If only we could go back in time?
Corrupt file or wish you could revert-back changes your colleague made? Most backup services are satisfactory… they’ll have a single, up-to-date copy of your files and folders from the last working day. So, in theory, should you endure a data loss, you’ll be able to reclaim the most recent copy […]
We recommend more than one source of backup…
Taking external hard drives home is no more… If you only have a single source of data backup on a local external hard disk or perhaps a NAS device, you may only have a single source in the circumstance of an accident provided the backup is often running, has no […]
Shield your Business properly, with EDR
Recognise and act on cyber threats to your business with Endpoint Detection & Response Learn lessons from cyber-attacks to better protect your business Businesses are facing well equipped and dangerous attackers, including nation states and cyber-criminals that are strong-minded to crack your cyber defences. Attacks are on the upsurge […]
Don’t be left with nothing, Backup your Data
Data backup…your last line of defence in the war against hackers What is the threat to my data? In the rise of terrorisations to our treasured & private data, cyber-criminals are forever generating new ways to interrupt and defraud our professional and private lives. One of the cyber threat […]
Protect your data with ATP
Keeping your data protected…With Office 365 Advanced Threat Protection Released back in 2017, in the wake of the rise in email born cyber-attacks, Microsoft released ATP as their non-compulsory add-on security service. Clarifying emails, with little impact on productivity, ATP is among the purest of the add-on’s suite to 365, […]
Phishing is smart, It’s only getting smarter…
Phishing is rife, and they’re only getting cleverer Hackers are pestering away via several routes to get access to your personal details. Email is by far one of the simplest means of admission for cyber criminals into a computer network. You can of course spam filter your emails, but only […]
Hackers are stealing and selling your Details
Your personal details & passwords might be up for sale on the Dark Web… but what is it? There are three main tiers to the internet – The first is known as the ‘Public Web’, forming only around 4% of the internet; The platform that we all use every day […]
Fileless malware: The guileful threat
Fileless malware isn’t new and are an increasingly prevalent threat against organizations. This type of malware is not as visible as traditional malware and employs a variety of techniques to stay persistent. Consequently, it can adversely affect your business process and the infrastructures that run them. Let’s take a closer […]
Autocomplete password risks
Advertisements and “helpful” suggestions based on your internet browsing habits can be troubling. But what’s even more alarming is that hackers have found another way of tracking you via seemingly harmless autocomplete passwords. Here’s what you need to know. Why auto-fill passwords are so dangerous As of December 2018, there […]
Why you need a VPN and how to choose one
Back in the day, simple antivirus software was all you needed to stay safe from security threats. Nowadays, it takes more than that to protect your online privacy. Whether you’re sending emails or chatting up a friend online, chances are your Wi-Fi connection can be intercepted. This is why you […]