Business Continuity: Keep your business running in the face of COVID-19

Posted by Ben Spector on 23-Mar-2020 10:18:29

Screen Shot 2020-03-18 at 08.26.13

Do you have the tools and processes in place to keep your employees productive to work from home for a sustained length of time? 

No matter what size of business you run, you need to ensure your employees have instant access to the info they need to do their jobs. Are they able to work from home? Is your company’s data safe if they do? Find out what you need to do to make sure your employees can work from home effectively and safely.

Read More

Topics: Disaster Recovery, Data Backup, Business Continuity, IT Downtime

Testing Business Resilience: 6 steps to create a successful Disaster Recovery Plan

Posted by Ben Spector on 27-Feb-2020 15:41:31

Disaster Recovery blog image

When did you last test your business resilience? Do you have a Disaster Recovery Plan in place? How long could your business survive with no access to your systems and data? If you’re not sure how to answer these questions, now is the time to act. Read on for the 6 steps you need to take to develop a robust Disaster Recovery Plan.

Read More

Topics: Disaster Recovery, Data Backup, Business Continuity, IT Downtime

IT downtime - what does it mean for your business?

Posted by Ben Spector on 28-Jan-2020 11:23:10

Network outages, power cuts, cyber attacks, flooding … disruptions to your business’s IT systems can strike at any moment, and with disastrous consequences. In our increasingly connected and digital world, it has never been more important for SMEs to test their business resilience and ensure they have a recovery plan in place should the worst happen. Find out why business continuity is a real threat. 

Read More

Topics: Disaster Recovery, Data Backup, Business Continuity, IT Downtime

How prepared is your business for data loss?

Posted by Joytan Fernandes on 11-Nov-2019 15:43:48

shutterstock_534464599Data loss can lead to putting a business in an unfavourable position. Global market intelligence firm IDC informs us that 40 percent of SMEs don’t back up their data at all! The purpose of this article is to inform businesses of the implications data loss can have to a business to satisfy the need of having backup in place. Data is the backbone of a business that all parties rely on and a loss of data means the business cannot perform well enough to deliver their product and/or services.

Read More

Topics: Cloud Computing, Disaster Recovery, Data Loss, back up

Faceless Cybercriminals Aren’t the Only People Who Might Steal Your Business Data

Posted by Ben Spector on 09-Jul-2018 14:39:33

shutterstock_189358703

Faceless Cybercriminals Aren’t the Only People Who Might Steal Your Business Data

Although most companies take measures to defend against external cyberattacks, threats from within are often overlooked. Find out how to defend your business against insider threats.

Read More

Topics: Data Breach, Disaster Recovery, firewall, Data, Data Backup, IT Support, business, computers, protection

Business Email Scammers Put Behind Bars

Posted by Ben Spector on 09-Jul-2018 12:21:36

shutterstock_583338262

Read More

Topics: Disaster Recovery, Business operations, cyber crime, IT Support, phishing, ransomware, anti virus, business, computers, cyber, cyber attacks, cyberattack, cybercrime, email, fraud, london, Office 365, Small Business, Cyber Security

SamSam Is on the Loose and Headed for a Server Near You

Posted by Ben Spector on 19-Apr-2018 14:32:52

In March 2018, the SamSam ransomware ravaged Atlanta’s computer systems, bringing many city services to a halt. This wasn’t the first time hackers used this ransomware to wreak havoc and it won’t be the last. Learn how SamSam differs from most other ransomware.

Read More

Topics: Cloud Computing, Data Breach, Disaster Recovery, firewall, Data Backup, helpdesk, IT, IT Support, phishing, ransomware, anti virus, business, cyber, cyber threats, cyberattack, cybercrime, Passwords, Server, Small Business, hacking, software, samsam, Cyber Security

How to Protect Your Business from Credential Stuffing Attacks

Posted by Ben Spector on 19-Apr-2018 14:21:00

Around 5 billion stolen credentials are available on the dark web, and cybercriminals like to use them in credential stuffing attacks. Learn how credential stuffing attacks work and what you can do to protect your company from them.

Read More

Topics: Cloud Computing, Data Breach, Disaster Recovery, firewall, solutions, Business operations, Data, Data Backup, helpdesk, IT Support, phishing, policy, ransomware, service, theft, anti virus, business, computers, cyber, cyber threats, cyberattack, cybercrime, fraud, london, MSP, Passwords, protection, Small Business, technology, File Sharing, Cyber Security

8 Policies to Protect Your Business’s IT Assets

Posted by Ben Spector on 05-Apr-2018 12:38:19

IT policies are important to have because they can help ensure that your company’s IT resources are being used appropriately and productively. Here are eight IT policies often found in companies.

Read More

Topics: Data Breach, Disaster Recovery, firewall, Business operations, Data Backup, IT, IT Support, anti virus, business, Communications, email, Google, london, managed, Office 365, Passwords, Small Business, technology, Cyber Security

How to Reduce Your Costs If Your Data Is Breached

Posted by Ben Spector on 21-Jul-2017 11:49:00

Being prepared for a data breach can save your business a great deal of money if one occurs. Discover what the top three preparations are and the extent to which they can reduce data breach costs.

Data breaches are occurring at record pace in 2017 in the United States and other parts of the world. Taking preventive measures, such as locking down your network, using security software, and creating strong passwords, can make it much harder for cybercriminals to infiltrate your business. However, despite your best efforts to prevent a data breach, your company might still experience one. This is partly due to the fact that data breaches are not always the result of cyberattacks. They are also caused by human error, system glitches, and malicious insiders.

Read More

Topics: Data Breach, Disaster Recovery, firewall, solutions, Business operations, Data Backup, helpdesk, IT, IT Support, theft, business, cyberattack, fraud, Small Business, Windows, budgeting, costs, File Sharing, Cyber Security

Join Our Mailing List

Recent Posts

Posts by Tag

See all