Is a cloud backup solution right for my organisation?

Cloud data backup solutions, also known as Backup as a Service (BaaS), have become increasingly popular in recent years. Yet, despite this, many organisations remain wary about using them. This article covers some of the advantages of cloud backup solutions and why they may be right for your organisation. Why backup data? It may seem like a daft question, but many organisations don’t really have a clear backup strategy. Most know that protecting their data, by backing it up, is…

Read More

The unsavoury side of USB storage

The unsavoury side of USB storage USB storage, (such as thumb drives, hard drives and mobile device integrated storage) is incredibly common in most workplaces. It’s cheap, convenient and provides a way of transferring or backing up large amounts of data easily. And, unfortunately, it is these attributes which make it a huge risk. A hacker’s friend Due to it’s ease of use and popularity, USB storage devices have become the favoured method of attack for many hackers and criminal…

Read More

Is antivirus all you need?

Many companies take they view that as long as they have an antivirus package installed on their computers, they’ll be fully protected from cyber attacks. After all, many antivirus packages offer a wide range types of protection, and are sold as a “one stop” solution, but is that the case? Very often not. What is the point of antivirus products? Computer viruses first appeared in the 1980s and were quite simple. Initially, written as a way of demonstrating the author’s…

Read More

Firewalls explained – A guide for non technical people

You may have heard the term “firewall” before and know that it is something to do with IT security, but what exactly are they and how do they work? With IT security now the responsibility of business owners, partners, directors or charity trustees, it is now important that these people understand what types of firewall exist and how they help protect client data. At it’s most basic, a firewall is a type of filter which ensures that data following between…

Read More

Why small and medium businesses are hackers’ favoured targets

Why small and medium businesses are hackers’ favoured targets According to Watchguard Technologies (a leading Internet security vendor), a staggering 80% of small and medium businesses believe that they’re too small to be of interest to hackers. However, their research shows that it is exactly these companies which are hackers’ favourite targets. But why? A false sense of security leads to an easy target As many small businesses don’t think of themselves as a target, they don’t bother to take…

Read More

Inventory management – Knowing what you have is fundamental to security

When we talk to IT managers, security professionals and directors, one of the first questions we ask is “How many systems do you have to secure?”. It’s a simple question, but one which rarely has a simple answer. The typical reply tends to start with the word “About” and therein lies the problem; you can’t effectively manage and secure what you don’t know you have! Depending on the industry your organisation works in, you will typically be covered by several items…

Read More