Backup vs archiving: when, why and how

There is often confusion between the two complementary processes of data backup and information archiving. In this article, we compare them and discuss the specific needs addressed by each one. We also review why organisations continue to need both a backup and an archiving solution even after they have moved to Microsoft Office 365. Comparing…

The evolution of spear phishing – is your business prepared?

Why is phishing spelt with a ph? What makes spear phishing different? Who’s a potential target? Spear phishing is a huge concern to organisations around the world. It’s therefore crucial to understand that the evolution of spear phishing, key targets, and best practices to prevent these pervasive attacks. Many people think that spear phishing is just…

Guaranteed peace of mind with email security

The bad news? A single security strategy won’t protect your business while threats are evolving, improving, and growing in sophistication. But the good news is that there are solutions. The polymorphic nature of modern cyber threats renders traditional signature-based defence mechanisms inadequate. On the other hand, in-depth defence techniques like sandboxing are expensive and come…

Deploying modern technology to your users

A core objective of every business is to ensure that revenue consistently outpaces costs. Technology plays a huge role in achieving that goal. Interruptions—whether hardware or software failure, user fatigue, or vexing collaboration issues—are significant inhibitors of productivity that employers must keep to a minimum to prevent adverse impacts on revenue. Demystify the productivity problem…

Know your IT security threats

Secure inboxes aren’t enough. Anti-malware software isn’t enough. Fraud detection isn’t enough. Physical backup isn’t enough. Can a business IT security strategy ever be enough to counter modern cyber security threats? Some of the challenge is because 91% of hacks start with a targeted email attack, and 80% of security-related breaches are caused by employee…

Juggling IT security budgets? Try this handy calculator

We know full well that IT budgets are under pressure, and whether it’s storage, networking, hardware, file sharing or security, there’s always something demanding the IT department’s attention – and cash. To try to help in this never-ending juggling of budgetary priorities, we thought it would be useful to share Kaspersky Lab’s IT security calculator,…

A simple switch from analogue to digital solutions

Get more done in less time with Philips digital voice recorders. Productivity Users can overwrite, insert, append, delete and mark their recordings as urgent. Efficiency Superior sound quality leads to less time to type documents, reducing backlog. Security Analogue tapes can easily get damaged, lost or stolen exposing client confidential data. File management Philips SpeechExec…

Business IT security – the challenges & solutions

Small and medium sized businesses are exposed to the same cyberthreats as everyone else is, and they need protection. But we get it – it’s not easy striking the right balance with your cyber defences; consumer cybersecurity products are insufficient, and yet enterprise solutions are too costly and complicated. At best, an small and medium…

The small hero of local storage

Down to earth, solid and secure Keeping your organisation’s data in the Cloud isn’t always the only and right option. It’s more about finding an approach that suits you. A survey in various countries across Europe has revealed that despite the opportunities that the Cloud offers, about 90% of employees still use USB drives to…