Articles

Web-filtering-protecting-your-staff-from-malicious-content
Business

Web filtering – protecting your staff from malicious content.

Another key component of cyber security is Web filtering (also known as Content filtering). Web filtering is similar to e-mail screening, in the sense that both technologies look to block threats before the end-user is exposed to them. So, when e-mail screening and web filtering are doing their job, you don’t have to rely on

Read More »
Business

Endpoint Protection

Malwarebytes Endpoint Detection and Response (EDR) provides cross-platform threat prevention and remediation for Windows, Mac and Linux computers. Easy Malwarebytes Endpoint Detection and Response for Windows and Mac can easily replace or augment other endpoint security solutions, including Microsoft Defender. Non-disruptive, role-based access, deploy within minutes. Lightweight endpoint agent, robust integrations. Intuitive cloud-native management console.

Read More »
Mailstore archiver best search and bonus backup
Backup

MailStore Archiver – Best search and bonus backup

Have you ever been frustrated with the lacklustre search abilities of Microsoft Outlook? Despite Microsoft’s continued promises of “the new improved search engine” it’s still less than stellar. And of course it can only search the time period you have configured to download offline. It won’t find an e-mail from years ago – to do

Read More »
How-often-should-I-be-performing-a-test-restore
Backup

How often should I be performing a test restore?

Before I answer this question, we first need to discuss the types of “real-life” restores that you may need to perform: 3 types of restores To perform a file or folder restore, the backupset (i.e. all the backup images) just needs to be intact. Likewise, to perform an ‘in-place’ bare-metal full system restore, again the

Read More »
Backup

Does your backup system support HIR?

This article is about how to perform restores of your server. Because this is a fairly “tech” area, unfortunately it is hard to avoid using some tech terminology. HIR / redeploy So, what does “HIR” stand for? HIR = Hardware Independent Restore Some vendors also refer to this feature as “redeploy”. In both cases, what

Read More »
Do-i-need-backups-if-i-have-office-365-thumbnail
Backup

Do I need backups if I have Microsoft Office 365?

The short answer is yes, and the long answer is more complicated. In particular we are talking about OneDrive and SharePoint. Both products have built-in versioning, which in my experience works well. So if your files are all encrypted but OneDrive keeps old versions of your documents, why would I need a third-party backup? There

Read More »
Business Continuity

Who Should Manage Your Business Continuity: In-house or Outsource

Times are tough for many businesses, with diminishing human and capital resources. You should know across every industry and sector, such as manufacturing, small and mid-sized businesses are struggling because of increasing risks, such as security threats and disruptions like the COVID-19 health pandemic. Regardless of the industry, from SMEs to ASX companies, the pressure

Read More »
are-you-sure-your-backups-are-ransomware-safe
Backup

Are Your Backups Safe from Ransomware Attacks?

With high-profile cyber-security breaches continually in the news, it’s common for small and medium-sized companies to be left wondering how exposed their business is to a ransomware attack. The unfortunate reality for many is that they are significantly ill-equipped, and could easily fall prey to an attack that would make an ATO audit feel like

Read More »
ransomware-attack-response-checklist.
Ransomware

Ransomware Attack Response Checklist

According to a recent Statista report, there were about 304 million ransomware attacks around the world in 2020, representing a 62% increase over the last year. In light of some recent ransomware attacks worldwide and in Australia, such as the Kaseya attack, you have to make sure that your organization or company is prepared. You

Read More »