by admin | Apr 28, 2022 | Blog, Cyber security, Email
The trouble with perception is, that if you don’t see something happening, you’re less likely to believe it exists. This happens a lot with spam and phishing. We asked some office workers we are acquainted with about how they view spam and how much spam they get at...
by admin | Jan 9, 2022 | Blog, Business Continuity, Charity advice, Cyber security, Email
The biggest vulnerability in any system is the person using it. People are fallible. We can be fooled, tricked and taken advantage of. That’s what phishing is designed to attack. But, with a little education, you and your teams can avoid the worst of these...
by admin | May 17, 2017 | Blog
Of course by now you would have undoubtedly heard about the global ransomware attack that began hitting businesses and institutions on Friday afternoon, already described as the “biggest ransomware attack in history”. The computer malware has since spread across 150...
by admin | Apr 12, 2017 | Blog, Knowledgebase
In light of the recent World Backup Day, which saw numerous calls for companies to be vigilant with their backups, we thought it timely to bring attention to one of the most important rules when it comes to protecting a company’s data. The 3-2-1 rule is widely...