The need to back up data has been around since floppy disks. Data loss happens due to viruses, hard drive crashes, and other mishaps. Most people using any type of technology have experienced data loss at least once. There are about 140,000 hard drive crashes in the...
Blog
What should your privacy policy cover?
As a business, you deal with a lot of personally identifiable information on a daily basis. It can come from anybody who interacts with your business. It could be your clients, your vendors, employees, etc. You need to have a privacy policy declaring how you, as a...
Think you are too small to be a cyber attack victim? Think again!
A recent study pointed out that SMBs are increasingly becoming targets of cybercriminals because their cybersecurity measures aren’t as strong, sophisticated, or effective as those of large companies. Often, SMB owners tend to think they are too small to be targeted;...
You can lose more in a cyber attack than you can imagine
One of the errors many smaller firms make–and some larger ones–is that they really don’t understand the broad-reaching effects of a cyber attack. If someone breaks into your home and steals a laptop, you may think “ well, insurance will pay for the laptop and the...
Why Cybersecurity shouldn’t be taken lightly
Let’s start with a “fun fact”: In 1981, the first cybercriminal was convicted of hacking into the AT&T network and altering its internal clock so it charged off-hour rates at peak times. So, it turns out that cybercrime is not all that new. But it stays new in the...
Why Managed Service may be the way to go for your data security
Since effective cybersecurity should be a proactive effort, not reactive, this means that SMBs tend to overlook the entire issue as something that can be pushed forward into the future. One way to get around this challenge is to have a service level agreement with an...
Cybercrime – Two basic routines to Protect Your Data
Cybersecurity is certainly not something to be ignored by organizations no matter how big or small they may be in terms of client base, staff or sales revenue. This is because cybercriminals don’t discriminate when it comes to choosing their victims. While bigger...
SMB and Some Basic Employee Security Issues
Training teams Your employees are your first line of defense. Training is a basic requirement and should be conducted for every employee. This necessitates involving Human Resources so that businesses incorporate cyber security training from the first day of...
Good Fences Make for Secure Data
Investing in firewalls, anti-malware and data encryption software Firewalls and anti-malware tools can help you by keeping unwanted actors out of your IT network. These tools work by restricting access to only pre authorized users and these are primarily defensive...
SD WAN – What’s up with that?
So what is this SD-WAN that you have been hearing about? SD-WAN, the acronym for Software Defined Wide Area Network is a new take on the traditional Wide Area Network (WAN). A standard WAN’s goal was to connect users at a branch to a main campus or central office. A...





