Unauthorised Internet Usage at Work

In the early days of the internet, some companies and organisations instigated quite draconian policies concerning deploying office equipment for personal usage; using a computer for personal reasons was either banned or only allowed during defined periods like lunchtime.  However, this was before everyone was equipped with their own Smartphone or tablet.   It is…

Details

Top Cyber Security Risks for Businesses

One threat that all businesses are vulnerable to it is cyber attack. And it’s not just big enterprises with large cash reserves that are popular targets. Small businesses are likely to have made a smaller investment in cyber security measures, opening the door to numerous security vulnerabilities for criminals to exploit.   The damage to…

Details

What Is a Disaster Recovery Plan in IT?

Disruption to business operations can have a catastrophic effect on business finances and reputation. Not only that, but these disruptions can come from anywhere at any time. The longer your business is out of action, the greater the negative impact on your business.    Whether the result of a cyber attack, natural disaster or power…

Details