3 IT investments you should always take seriously

What is standing between your business’s data and hackers a world away? What’s your plan when your on-site server fails? When you skimp on technology and IT solutions for your business, the answers to these two questions become simple: 1. There is nothing standing between your business’s sensitive data and people who want to take…

3 critical errors you’re making by hiring the cheapest computer support company

In preparation for the New Year, business owners across the country are taking a close look at their finances, scratching their heads as they inspect their budgets, line by line, to cut everything that isn’t absolutely necessary and searching for new investments that will boost their bottom line. In the midst of all this, it’s…

Making this one mistake with your network could destroy your business

A lot of businesses wait until something breaks before they fix it. And even then, they may take a “patchwork” approach to fixing the problem. They are reactive rather than proactive. Sometimes taking a reactive approach is fine, but other times, and depending on the circumstances, it can lead to even bigger problems. When it…

3 critical cyber security protections EVERY business must have in place

Five years ago, you might have had state-of-the-art security protecting your business and network. You had the latest malware protection, highly rated firewalls and a great data backup plan. Maybe you even had a handbook on how to address cyberthreats. You were set. But then you forgot to do one crucial thing: you didn’t stay…

The BIG mistake companies make with their IT Security

If you’re like many businesses today, there’s a good chance you’ve made this one mistake with your IT security: you don’t budget for it. Or if you do budget for it, it’s not enough to really protect your business. Time and time again, business owners decide NOT to invest in IT services. Instead, they go it alone…

Mutifactor Authentication

We understand how important IT security is. At work all our computers are up to date with operating systems and patches. If a stage 4 lockdown occurs, it means my staff have to work from home. Staff are now using their home computers to login and access our systems. I know this comes with risk.…

Last line of defence

We set up our backup years ago. We’re covered. I hear this sort of thing from so many businesses. Unfortunately, backup isn’t the type of thing you can just set and forget about. If your company finds itself compromised by a serious event like cyber-attack or an employee makes an innocent mistake, often your backup…

Virus Attacks

We have a Firewall and antivirus so we are safe. We’re covered.  I often hear this response. And to be fair, this is a good start. In fact, we had a similar line of thinking before we were brought in to diagnose what had happened to a company who was hit by a serious virus…

Firewalls – is yours up to scratch?

We’re protected. We set up a firewall a few years ago. I hear this sort of thing from so many businesses. Unfortunately, cybersecurity isn’t the type of thing you can just set up and forget about. On top of that not all Firewalls are equal. Viruses, malware, and hackers are constantly evolving which means your…

You’ve just experienced a cyberattack. What do you do?

When I speak with small businesses about cyberattacks, it’s surprising how most of them don’t have a plan if they get hit. Where do you store your data backups? How will you continue to operate if you lose your data? These are the types of questions you need to ask yourself in order to properly…

Hackers – how and why?

HOW do hackers steal your data? WHY do they do it? Nearly every business I talk to is worried about cyberattacks. Two of the most common questions I hear are “How do hackers attack?” and “What’s their motivation?” When it comes to hackers, there are three common strategies used: Social engineering. Brute force. Phishing emails.…

The risk around emails

We have our email in 365 so we are safe. We’re covered. I often hear this response. Unfortunately, just because your email sits in Microsoft cloud (or anyone ones cloud) does not automatically mean all is OK. Majority of the time the vendor is responsible for the uptime and availability of their service however it’s…