IT Security for Small Businesses – Are You Listening?

Hacking of the IT resources of small and medium businesses is on the increase. The age-old excuse of ‘We have nothing worth hacking’ is no longer valid, although this doesn’t always register with SMBs. Hackers see small businesses as targets of interest for several reasons. Firstly, SMBs are vulnerable. Their security is weak, because of […]

How Technology Smooths the Way for Business Continuity and Disaster Recovery

While good planning and processes are at the heart of business continuity and disaster recovery, technology can accelerate the benefits as well. We live in an age of cloud computing and smartphones. Both can be used to help an organisation get back on its feet after incidents, or simply ride them out without severe or […]

Making Virtualisation in IT an Advantage, not a Risk

The big selling point about virtualisation, at least in disaster recovery terms, is the power it gives to handle single points of IT failure. The idea is to distribute applications the right way over a number of servers; then if one physical machine crashes, another one should be available to ensure that applications can continue […]

How Well Does Your Company Password Policy Perform?

If you haven’t seen it, you’ve probably heard about it: the sticky note on the computer screen with the account login and password for all to see. While this archetypally bad behaviour has security officers recoiling in horror, there are also other less obvious forms of password vulnerability that affect many organisations. Fundamental problems that […]

Are Chinese Businesses Doing Well Because of or In Spite of the Web Security?

Is there a relationship between the Internet control and censorship policy in China, and the country’s economic success? Chinese Internet censorship has meant that access has been denied to Facebook, Twitter, YouTube and many others (Wikipedia estimates over 2,600 websites in total). Meanwhile the Chinese economy continues to grow. While the jury is still out […]

Five Strategies to Prevent a Distributed Denial of Service (DDoS) Attack

Distributed Denial of Service (DDoS) attacks are becoming a trending and serious issue when it comes to Cyber Security across many industries in particular the banking and financial sectors. In a DDoS attack Botnets (usually referred to as a “Zombie army”) bombards a server or a network with thousands of system requests sent from infected […]