A disaster recovery plan is what an organization should have in order to triage certain items on its network, such as systems, infrastructure, databases, and ...
5 practical steps to avoid a cyber attack
For a long time, a cyber attack seemed to be a problem that only affected the largest multi-billion dollar corporations. But as these organizations have ...
Virtual Wire Pairs – improving network security without extra hardware
Ever found yourself in the unfortunate circumstance of having to support devices on your internal network that tend to pose a higher security risk than ...
Coronavirus scams: what to look out for and how to stop them
The world has quickly changed over the past few weeks, but the one thing that hasn’t is the inclination of shady characters to exploit individuals ...
The top security trends to watch for
In this article, we look at some key Information Security trends to look for, along with the things you need to consider if you want ...
Backups and recovery, Cloud computing, IT strategy, Servers, Virtualization, Windows
Storage Spaces Direct deployment best practices
Introduced in Microsoft Windows Server 2016, Storage Spaces Direct (S2D) is Microsoft’s new software-defined storage solution that allows enterprises to create logically defined storage volumes ...
Firewalls, Office 365, Security
How to protect your Office 365 tenant – essential implementation steps
With many organizations choosing to move services to the cloud, the difficulty for most is related to the overall Security within the Cloud. If you ...
Monitoring, Networking, Security, Wireless
Using Aruba ClearPass for Network Access Control [Use Cases]
Organizations today love the idea of anywhere, anytime connectivity, but in their rush to get everything connected, often ignore the need for secure Network Access ...
12 Dos and Dont’s at Christmas for trouble-free IT
It’s the holiday season—many of us have already given thanks, and some of us are now celebrating with friends and families. Some of us fortunate ...
Malware evolution, or in other words, “all your data are belong to us”
It’s a twist on a popular internet meme based on a phrase from the classic arcade game, Zero Wing. Only, in this case, it’s not ...
Gmail IP address ranges – here’s how to find ALL the public ones
If you’re like most firewall administrators, you dislike the idea of opening up port 25, 465, and 587 for outbound traffic to the -entire- internet. ...
Nonprofit IT security plan for data, systems and processes
As if running a nonprofit organization, raising money and helping the community isn’t enough of a struggle. Every nonprofit must worry about hackers targeting their ...
Cloud computing, Firewalls, Networking, Security, Wireless
Security risks affecting your network and how to deal with them
Infiltrating the security of your core business network could be devastating for any sized business, particularly small businesses. Ransomware freezes the system, holding it hostage ...
Is cyber insurance a necessity or a luxury?
Many of us view insurance as a necessary evil. We loathe paying the premiums, but we all deal with it at some point—whether it’s health ...
Minimise the risk of ransomware with these 10 effective methods.
Ransomware is a type of virus/malware that restricts access to an infected computer (by encrypting the files) and requires the person pay a ransom to ...