12 10, 2016

Cybersecurity Tips for Employees Series (Week 2): Physical Security Precautions

2019-08-05T13:22:31+08:00

Welcome to this week 2 in the series on Cybersecurity Tips for your employees.  Today we will be covering Physical Security Precautions, that while sound simple in practice can have a great impact on keeping business information secure.

Cybersecurity Tips for Employees Series (Week 2): Physical Security Precautions2019-08-05T13:22:31+08:00
5 10, 2016

Cybersecurity Tips for Employees: The Complete Guide to Secure Behaviour Online and in the Office (Introduction)

2019-08-05T13:22:31+08:00

Welcome to this 7-week series on Cybersecurity Tips for your employees.  In these series we will be covering off the following topics:

  1. Week 1: Introduction – The Need to Educate Employees on Cybersecurity
  2. Week 2: Physical Security Precautions
  3. Week 3: Email Threats
  4. Week 4: Username and Password Management
  5. Week 5: Mobile Security
  6. Week 6: Secure Website Browsing
  7. Week
Cybersecurity Tips for Employees: The Complete Guide to Secure Behaviour Online and in the Office (Introduction)2019-08-05T13:22:31+08:00
21 09, 2016

17 Tips to better password security

2019-08-05T13:22:31+08:00

Most people do not know that there are a number of very common techniques used to crack people’s passwords and a lot more ways we make our accounts more vulnerable by using simple and widely used passwords.

17 Tips to better password security2019-08-05T13:22:31+08:00
9 09, 2016

VDI – What you need to know

2019-08-05T13:22:37+08:00

Desktops computers or colloquially FAT Clients are an awful, wasteful way to enable workforce productivity. With failing disk drives, space consumption, security defeating features, and the never ending upgrades to cater for the endless specification creep of software, people with larger desktop fleets have had no other choice but to look

VDI – What you need to know2019-08-05T13:22:37+08:00
17 08, 2016

4 measureable benefits to ‘smart printers’

2019-08-05T13:22:38+08:00

Businesses that fail to keep up with the latest “smart printer” technology are likely to fall in productivity as well as competitiveness.

The way we work, has been changed by technology, turning any location, coffee shop or park into a mobile office.

If businesses don’t adapt and adjust, they will find it harder

4 measureable benefits to ‘smart printers’2019-08-05T13:22:38+08:00
3 08, 2016

Endpoint Security Management: Securing Today’s Perimeterless Networks

2019-08-05T13:22:38+08:00

Growing mobile device usage requires comprehensive endpoint device security management.

As the variety of ways workers connect together and to the internet to work expands, so do the steps needed to be taken to ensure those connections are secure and not a risk to your business.

Employees are increasingly using mobile

Endpoint Security Management: Securing Today’s Perimeterless Networks2019-08-05T13:22:38+08:00
13 07, 2016

7 steps to help avoid CyptoLocker (ransomware) infections

2019-08-05T13:22:38+08:00

The big threat to businesses these days are in the form of RansomWare (a form of MalWare). That term is very apt for the type of this malicious software. It literally holds all your data and files hostage, demanding you pay a ransom amount in order to unlock your files and regain access to your

7 steps to help avoid CyptoLocker (ransomware) infections2019-08-05T13:22:38+08:00
Go to Top