By now I am sure everyone has heard of terms like Disaster Recovery and Business Continuity. These are terms used to describe the processes and tasks undertaken to ensure the return to service in the event of critical impact to the function of your business.
When Facebook first began, the innocent allure of being instantly connected to people all across the world was certainly too good to resist for most of us. As the Facebook platform evolved more and more, people have become engrossed in everything that Facebook has to offer.
We are relying more and more on our mobile devices to run and manage our day-to-day lives. Smartphones act as our map, diary, wallet, shopping platform and social connection device.
Our increasing dependence on interconnecting digital platforms is constantly under threat from cyber criminals who aim to disrupt and extort business and governments. They do this by targeting vulnerabilities in systems and people's habits to infiltrate information stores, data and networks.
When thinking about shopping for a new storage system or upgrading your current system it can be overwhelming as there is a lot options and confusion between which one is best.
Digital disruption and the reach of social media continue to grow exponentially. Society now views a company's behaviour through the lens of corporate citizenship,
I am often finding myself on a Wednesday afternoon with an inbox full of email and a little conflicted as to how I am going to clear them all and also complete my other tasks before the end of the week. So, I looked into how to manage my email and found 4 really interesting hacks.
We all know that when working with customers, close enough should never be good enough. This is especially true if you want to retain customers and grow. Murphy's Law lies in waiting, only a moment away, ready to strike at the worst times despite all good intentions and quality systems.
Buying your child's first laptop for school use is a daunting experience. You have to weigh up specifications, features and brands against price, yet still there are factors that leave you anxious. Will the technology be obsolete next year? Will it be good enough for your child's curriculum? These are all valid questions and hopefully, I can provide some insight to help make your decision less stressful.
As technology is forever reaching new heights and changing the way we work, our health increasingly suffers in more ways than we are aware. How do we fix this? Get moving. In 1990 the Australian Standards for screen-based workstations was written and at the time this only included a desktop computer on a permanent desk, even though laptop computers were launched approx. 5 years earlier.
I, like most people, take my mobile phone with me (almost) everywhere I go. I use it for standard features such as phone calls and text messages, as well as an organiser with (multiple) reminders, managing several email accounts (personal and work), various social media platforms (again personal and work), camera and video features, banking, games, music, the list goes on.
A recently released Data Breach Investigations report identified that 63 percent of confirmed data breaches involved weak default or stolen passwords. This asks the question, is multi-factor authentication a critical component to any organisation's approach to data security?
Over the past few months I have heard the saying “work smarter, not harder” dozens of times, however I personally never knew what it meant. How could someone work hard but not smart? I took it upon myself to dive into research and define what it means, and how it could relate to my day to day routine.
According to the World Economic Forum Business Email Compromise (BEC) or CEO Email Fraud cost organisations over $3.01 billion in 2015 and 2016. These are staggering figures that cost organisations of all sizes enormous amounts of money in direct costs, lost revenue, lost goodwill with customers, and damage to their corporate reputation.
5 Ways to Protect Against the Very Real Threat of Ransomware: 1. Back up your data; The single biggest thing that will defeat ransomware is having a regularly updated backup. If you are attacked with ransomware you may lose that document you started earlier this morning, but if you can restore your system to an earlier snapshot or clean up your machine and restore your other lost documents from backup, you can rest easy.
I’ve recently heard from a customer their experience associated with a key staff member moving on and taking highly valuable, extremely sensitive business critical data with them, unauthorised. Naturally, we all want to trust our staff and would never expect this to happen, but reality and experience says that it unfortunately does.
How often do you backup your business critical data? I would hazard to guess that the answer to that question from most organisations is once daily, normally after business hours. There is nothing unusual about that, it is an fairly common and acceptable methodology now days.
Like any industry vertical, we all have our challenges. I read with great interest over the weekend a Blog recently published by “Secure Edge Networks” about the 7 Biggest Classroom Technology Trends and Challenges, and their effect on educational facilitators and underlying supporting facilities.