fbpx

April 2020

Why You Need to Be Using Multi-Factor Authentication Company wide

2020-04-06T08:08:27+10:00Security|

Why You Need to Be Using Multi-Factor Authentication Company wide Weak or stolen passwords are responsible for approximately 63% of all data breaches. This is why the purpose of many phishing campaigns is to steal user login credentials. Office 365 users have seen an increase in scams specifically designed to

March 2020

What is Microsoft Intune and How Can it Protect Your Office 365 Data and Endpoints?

2020-03-30T11:02:24+10:00Microsoft 365, Security|

What is Microsoft Intune and How Can it Protect Your Office 365 Data and Endpoints? Prior to the computer age, company files were in paper format and were stored in filing cabinets, which wasn’t great for sharing, editing, or finding easily, but did have the advantage of restricting access.

Top 5 Threats to Mobile Device Security

2020-03-02T10:57:02+10:00Mobile Device Management, Security|

Top 5 Threats to Mobile Device Security Smartphones have completed their evolution from wireless telephones to tiny “pocket computers” and statistics in a number of areas show that mobile use is outpacing desktop computer use. It seems that people prefer their portable devices to connect online over computers that are

Comments Off on Top 5 Threats to Mobile Device Security

February 2020

6 Critical Reasons to Use an Antivirus with EDR Capabilities

2020-02-17T12:00:26+10:00Security|

6 Critical Reasons to Use an Antivirus with EDR Capabilities Antivirus software has been around almost as long as computers themselves, tracing their roots back to the 1970’s. And just as threats to computer networks have evolved from simple viruses to sophisticated malware in multiple forms, so has the antivirus

Comments Off on 6 Critical Reasons to Use an Antivirus with EDR Capabilities

January 2020

What Does Dark Web Monitoring Really Do for Identity Protection?

2020-03-11T07:50:30+10:00Backup & Disaster Recovery, Security|

What Does Dark Web Monitoring Really Do for Identity Protection? You may have seen one of those commercials showing a shady figure typing at a keyboard promoting a Dark Web monitoring service and wondered if it was worth trying out.

Comments Off on What Does Dark Web Monitoring Really Do for Identity Protection?

Why Managed IT Services are Important for Accounting Firms

2020-01-29T15:27:34+10:00Managed Services, Security|

Managed IT Services for Accounting Firms Technology has changed just about every industry there is, and that includes accounting and finance. With most client records now being stored in digital format has come both improved efficiency and a more urgent need for information security.

Comments Off on Why Managed IT Services are Important for Accounting Firms

Has My Office 365 Account Been Compromised?

2020-01-13T13:05:55+10:00Office 365, Security|

Has My Office 365 Account Been Compromised? (Telltale Signs & What to Do) Whenever a particular technology becomes popular, it also becomes a big target for hackers. Microsoft Office 365 is the most used cloud platform in the world, which has led to an alarming rise in account takeover (ATO)

Comments Off on Has My Office 365 Account Been Compromised?

6 Security Benefits of Implementing Sensitivity Labels in Office 365

2020-01-13T13:07:20+10:00Office 365, Security, SharePoint|

Implementing Sensitivity Labels in Office 365 The average office can generate hundreds of new documents each month, but not all of them need to be safeguarded in the same way. Some documents might be public facing, such as sales brochures, while others might involve proprietary company information that should not

Comments Off on 6 Security Benefits of Implementing Sensitivity Labels in Office 365

December 2019

Most Data Breaches are Due to Stolen Credentials – Tips to Protect Your Passwords

2019-12-30T13:36:52+10:00Managed Services, Security|

81% of Data Breaches are Due to Stolen Credentials… Tips to Protect Your Passwords Passwords have become the golden key that can get a hacker into a data treasure trove. They’re the most popular method of entry for hacking-related data breaches (81% of them) because if a hacker has a

Comments Off on Most Data Breaches are Due to Stolen Credentials – Tips to Protect Your Passwords

The Vital Layers of Protection You Need in Your IT Security Strategy

2019-12-06T14:59:49+10:00Security|

The Vital Layers of Protection You Need in Your IT Security Strategy   Businesses are facing more security threats today than ever before, and new types of cyberthreats are emerging all the time. From ransomware to phishing attacks to form jacking, companies have to be on their toes and employ

Comments Off on The Vital Layers of Protection You Need in Your IT Security Strategy