Posts

5 ways to protect your mobile device from malware

5 ways to protect your mobile device from malware

GSMA real-time intelligence data estimates there are now over 5.15 Billion people worldwide with mobile devices. With over 66% of the world’s population having a mobile device (cell phone, tablet or cellular enabled IoT devices) security is…
3 Reasons to Use Cloud Backup

3 Reasons to Use Cloud Backup

Wondering why you should use cloud backup? Top reasons include technology failure, cost savings, and security. We break it down in this informative infographic!   (View infographic as a PDF)
Top 7 Ways to Prevent Employee Data Theft

Top 7 Ways to Prevent Employee Data Theft

Data is everywhere; it’s like air. And the volume of data companies are accumulating is growing at an exponential rate. It is estimated that by 2020 every human will create 1.7 megabytes of information each second. This works out to more than…
Top 7 Weaknesses that Malware Exploits

Top 7 Weaknesses that Malware Exploits

Malware threats are on the rise! So how are these viruses, worms, and trojans continuing to infiltrate businesses around the world? We break it down in this informative infographic! (View infographic as a PDF)
Top 3 Criteria for Choosing Cloud vs On-Site Backup

Top 3 Criteria for Choosing Cloud vs On-Site Backup

Backing up your data is like insurance. You need to do it so you’re prepared when disaster strikes. From natural disasters to hardware failures to malware, the threats are significant. Seagate reports that 140,000 hard drives fail in the United…
9 Key Elements of a Disaster Recovery Plan

9 Key Elements of a Disaster Recovery Plan

The question isn’t if your business will experience a disaster, it’s when. From hardware failures to natural disasters to cybercrime, the threats to your business are growing in number and severity. Seagate reports that 140,000 hard drives…
5 Types of Phishing & How to Prevent Being Caught

5 Types of Phishing & How to Prevent Being Caught

Phishing gets lots of media attention; however, for many it is a bit of a mystery. What is phishing? Are there different types of phishing? How can you prevent a phishing attack? Let’s investigate each of these areas in detail. What is phishing? Wikipedia…
4 stages of a ransomware attack

4 stages of a ransomware attack

You hear news reports almost daily about ransomware taking down organizations around the globe. Cyber Security Ventures estimates a new organization will fall victim to ransomware every 14 seconds in 2019, and every 11 seconds by 2021. What…
What’s the #1 cause of data loss?

What’s the #1 cause of data loss?

The answer will surprise you. Data loss is a battle organizations big and small are constantly fighting. According to a recent Gartner report, global spend on Information Security and Data Protection will reach USD $124 billion in 2019.  This…
8 Malware & Ransomware Threats You Need to Know

8 Malware & Ransomware Threats You Need to Know

To understand malware and ransomware we need to first define what each is. Let’s start with the basic definitions: Malware is a broad term describing any malicious code or program, including viruses, worms, and trojans, that provide an…
What is the real cost of data loss

What is the real cost of data loss?

Virtually every individual and business will be impacted in some way by cyber crime, ransomware and hardware failures. The stories are all different but the end result is the same - data loss. Putting a cost on data loss is difficult. For an…
NSA warns Microsoft Windows Users to Update Now

NSA warns Microsoft Windows Users to Update Now!

On June 4th the National Security Agency (NSA) published an advisory warning Microsoft Windows administrators and users to “ensure they are using a patched and updated system in the face of growing threats.” Dubbed “BlueKeep”, the threat…