Security

Cyber Security Threats 2017 – How to Protect your Website

Cyber Security Threats 2017 – How to Protect your Website

For those of you who thought we were winning the battle against cybercriminals, think again.  2016 saw a huge increase in cyber-attacks, including the biggest attack in history which brought down much of the US internet. The outlook for 2017 looks just as pessimistic – not just because of an increase in attacks but also …

8 Ways to Defend Your Business from Ransomware Attacks

8 Ways to Defend Your Business from Ransomware Attacks

Ransomware is on the rise. According to Symantec, there was 35% increase in ransomware attacks in 2015 and this figure is set to rise again in 2016. In the past, ransomware was primarily aimed at Windows-based machines, targeting personal and office computers: now, however, those who develop the software have begun to make versions that …

Ominous 2016 Web Security Stats Show Need for Vigilance

Ominous 2016 Web Security Stats Show Need for Vigilance

Security firm, Symantec’s 2016 Internet Security Threat Report has revealed some startlingly ominous statistics about the increased threat faced by businesses with websites and online applications. Although it’s grim reading, it makes it absolutely clear to webmasters about the need to be vigilant and to be thoroughly proactive when it comes to security. If you …

14 Disaster Recovery Terms Every Business Owner Needs To Know

14 Disaster Recovery Terms Every Business Owner Needs To Know

Does the term ‘warm site’ leave you cold? Are you baffled by ‘redundancy’? And when your IT consultant mentions your RPO do you just grunt and nod your head knowingly, when really you don’t have a clue? You’re not on your own. When it comes to disaster recovery terminology many small business owners and employees …

Symantec endpoint vulnerability advisory

Symantec endpoint vulnerability advisory

A new security vulnerability has been found within Symantec and Norton Anti-virus core code that potentially allows an attacker to take full control over the target machine. What is different about this particularly vulnerability is that it does not require the end user to perform any interaction with the infected file but rather the exploit …

10 Tips for an Effective Disaster Recovery Plan

10 Tips for an Effective Disaster Recovery Plan

For many companies, reliance on IT means that they would not be able to operate if their system went down. If this sounds like your company, it’s crucial that you have a disaster recovery plan in place so if the worst happens, you are fully prepared to get back online as swiftly as possible. If …

Pin It on Pinterest