Articles

How-to-Protect-Your-Backups-from-Ransomware
Backup

How to Protect Your Backups from Ransomware

Did you know that the cost of cybercrime alone in Australia was $29 Billion in 2020?  A survey undertaken by the Australian Cyber Security Centre found 62% of the 1,763 small businesses that responded have been a victim of Cybercrime. Your backup system is your insurance policy. In a worst-case scenario, if you do experience

Read More »
Why-is-Staff-Training-a-key-component-of-your-Cyber-Security-Plan
Business

Why is Staff Training a key component of your Cyber Security Plan?

So, why is staff training important? Because security is not just about software vulnerabilities, cyber-security is also about people, your staff. Countermeasures like anti-virus, patch management, e-mail screening, web filtering; all of these will reduce your risk of a breach. And they’re all worth doing. But none of these technologies should be considered perfect, all

Read More »
Web-filtering-protecting-your-staff-from-malicious-content
Business

Web filtering – protecting your staff from malicious content.

Another key component of cyber security is Web filtering (also known as Content filtering). Web filtering is similar to e-mail screening, in the sense that both technologies look to block threats before the end-user is exposed to them. So, when e-mail screening and web filtering are doing their job, you don’t have to rely on

Read More »
Business

Endpoint Protection

We are regularly asked by our clients (and colleagues) which Endpoint Protection we recommend? And in case you weren’t aware – “Endpoint Protection” is what used to be called “Anti-Virus Protection”. The change in name simply reflects that much more is required from the protection now than being simply a “virus scanner”. Almost all Endpoint

Read More »
Mailstore archiver best search and bonus backup
Backup

MailStore Archiver – Best search and bonus backup

Have you ever been frustrated with the lacklustre search abilities of Microsoft Outlook? Despite Microsoft’s continued promises of “the new improved search engine” it’s still less than stellar. And of course it can only search the time period you have configured to download offline. It won’t find an e-mail from years ago – to do

Read More »
How-often-should-I-be-performing-a-test-restore
Backup

How often should I be performing a test restore?

Before I answer this question, we first need to discuss the types of “real-life” restores that you may need to perform: 3 types of restores To perform a file or folder restore, the backupset (i.e. all the backup images) just needs to be intact. Likewise, to perform an ‘in-place’ bare-metal full system restore, again the

Read More »
Backup

Does your backup system support HIR?

This article is about how to perform restores of your server. Because this is a fairly “tech” area, unfortunately it is hard to avoid using some tech terminology. HIR / redeploy So, what does “HIR” stand for? HIR = Hardware Independent Restore Some vendors also refer to this feature as “redeploy”. In both cases, what

Read More »
Do-i-need-backups-if-i-have-office-365-thumbnail
Backup

Do I need backups if I have Microsoft Office 365?

The short answer is yes, and the long answer is more complicated. In particular we are talking about OneDrive and SharePoint. Both products have built-in versioning, which in my experience works well. So if your files are all encrypted but OneDrive keeps old versions of your documents, why would I need a third-party backup? There

Read More »
Business Continuity

Who Should Manage Your Business Continuity: In-house or Outsource

Times are tough for many businesses, with diminishing human and capital resources. You should know across every industry and sector, such as manufacturing, small and mid-sized businesses are struggling because of increasing risks, such as security threats and disruptions like the COVID-19 health pandemic. Regardless of the industry, from SMEs to ASX companies, the pressure

Read More »