We all use our phones for a lot more than sending messages and making the occasional call. And that means most of your staff are probably using their personal mobile for work now and then. Everyone does it. The downside of this is it puts your business data at risk. If it can be accessed on a personal mobile and … Read More
Helpful Tips for Keeping Your Shared Cloud Storage Organized
Cloud file storage revolutionized the way we handle documents. No more having to email files back and forth. No more wondering which person in the office has the most recent copy of a document. Between 2015 and 2022, the percentage of worldwide corporate data stored in the cloud doubled. It went from 30% to 60%. A majority of organizations use … Read More
None of your team would fall for this trick… would they?
Cyber criminals have a reputation for constantly coming up with new ways to scam us into handing over login details or sensitive data. And while you might think your team would spot an attempted attack, you could be surprised. We’ve seen a lot of intelligent people – including many business leaders – caught out over the years. One of the … Read More
Which Form of MFA Is the Most Secure? Which Is the Most Convenient?
Credential theft is now at an all-time high and is responsible for more data breaches than any other type of attack. With data and business processes now largely cloud-based, a user’s password is the quickest and easiest way to conduct many different types of dangerous activities. Being logged in as a user (especially if they have admin privileges) can allow … Read More
Top 5 Mobile Device Attacks You Need to Watch Out For
Smartphones and tablets are often the preferred device for communications, web searching, and accessing many types of apps. They’re more portable and can be used from anywhere. We’re seeing the takeover of many activities that used to be performed on traditional computers. Now, people are using mobile devices instead. For example, Microsoft estimates that up to 80% of the workload … Read More
Signs That Your Computer May Be Infected with Malware
Approximately 34% of businesses take a week or longer to regain access to their data and systems once hit with a malware attack. Malware is an umbrella term that encompasses many different types of malicious code. It can include: Viruses Ransomware Spyware Trojans Adware Key loggers And more The longer that malware sits on your system unchecked, the more damage … Read More
4 Interesting Cloud Storage Trends to Watch for in 2022
One area of cloud computing that is used widely, but often isn’t as flashy as the software side is cloud storage. Storing files in the cloud to make them easily accessible and shareable from anywhere was one of the very first uses of the cloud that was adopted widely by many users. As advances like automation and AI come to … Read More
The Critical Importance of Virtualized Infrastructure Security (And 4 Ways to Enhance It)
A torn-down virtual infrastructure creates risks for any business. And it can have a significant impact on how quickly you can retrieve your data and resume operations following an attack. These days, many businesses use virtualized infrastructure for more straightforward data storage. It’s because this approach is superior to physical solutions due to enhanced flexibility, straightforward provisioning, and affordable pricing. … Read More
Should you backup Office 365?
Yes, if you think Microsoft back up your Office 365 data, you’re not alone. But you’re also wrong. This common misconception puts your critical data and entire business at considerable risk. The data in your Office 365 mailboxes, SharePoint, and OneDrive is in fact explicitly your responsibility to protect. Here it is in black and white, from Microsoft’s Office 365 service agreement: … Read More
- Page 2 of 2
- 1
- 2








