T : 1300 123 428
E : info@ictechnology.com.au

333 George Street
Sydney 2000

Unit A2, 101-115 Rookwood Rd
Yagoona NSW 2199

Search

News
  -  News (Page 4)

From Uber to Australian Defence and Aussie government banks, 2017 witnessed some biggest security lapses in the last decade. Read these highlights: (Source - As published in CRN News)

  1. Uber disclosed in November that hackers had stolen information from up to 57 million rider and driver accounts last year in a massive data breach. The company paid the thieves US$100,000 in October 2016 to delete the data and keep quiet about the breach, according to a Bloomberg News report.
  2. The personal details of 48,270 Australian government, banking and utility employees were exposed online by a third-party contractor.
  3. An attack on a subcontractor to Australian Defence resulted in the loss of 30 GB of "commercially sensitive" documents. The highly sensitive documents included projects for the Joint Strike Fighter (JSF) program and the P-8 Poseidon “submarine killer” plane and detailed designs of Australian Navy ships.

Cybercriminals do not care about the size of your business. They just look for two factors – Is there money? & How difficult is it to attack the victim's system? This is where Kaspersky security software acts smart to fortify the cyber perimeter for your business protection. Following articles on Kaspersky anti-ransomware solution and Kaspersky endpoint security, in this article, I am going to discuss the features of Kaspersky Small Office Security.

In our previous article, we discussed Kaspersky Anti-ransomware solution for small businesses. As I mentioned - it is not a full-fledged version. For better protection and enhanced security, you need an advanced solution that can understand the critical endpoint security requirements of any business. Kaspersky Endpoint Security can be a perfect fit, especially for small and mid-size businesses. Be it a mobile device or file server, Kaspersky Endpoint Security Cloud will let you manage all security requirements remotely at any time.

From last couple of years, Anti-ransomware Solution is gaining popularity among cybercriminals primarily because of its capacity to restrict access to important files and sensitive data on a victim’s computer. We can’t forget Wannacry 2017 attack and how badly it exploited many businesses with malicious virus for numerous oganizations across the globe. One year has passed and we’re still in danger of ransomware attack. That’s why Kaspersky Lab has paid close attention to encryptors and decryptors. The experts are working really hard to develop specific tools to counter security threats.

Undoubtedly, Phishing Scam is the most sophisticated cyber-attack from the list of endless security threats. Although it may sound fairly simple, due to its legitimate appearance, it is one of the proven tactics adopted by hackers for duping a victim and capturing his private information. The attacker masquerades himself as a trusted entity that you may think is harmless, for instance; a request from his bank or a note from a company ID to click a link or download an attachment.

Tight budgets, limited resources! Are you facing a similar situation in your business? If yes, what’s your plan to drive your business forward and make it more profitable in current situation? When businesses are in growth cycles or experiencing a slowdown the top priority is how to manage budgets prudently so that it supports growth and scales the operations in a secure and reliable way. One common approach for a people-centric company is to do a deep analysis of business operations that can help cut down overall expenses. Some tasks like IT network security, Cloud management businesses often require hiring expensive resources and block unnecessary funds. But sometimes businesses don’t want to outsource it. So, what’s the right path?

With more data and systems on the Cloud, network security has become more important than ever. A recent RightScale 2018 State of the Cloud survey reports 96% respondents use cloud services of which 81% respondents have a multi-cloud strategy (Survey was done on 997 tech pros). These statistics clearly point to the fact that most companies are using one or other form of Cloud network. Switching to the Cloud can boost your business efficiency and scalability but it can also invite some risks like network security or downtime concern. If your network goes down, a business can’t function. So, how can you streamline your business operations to stay productive while on Cloud? Let’s look at this:

Ever thought how downtime can hurt your business, especially because of an IT issue? For years, one universal standard to measure downtime is calculating the “cost to business”. However, the overall loss to the business is much bigger than we can actually see. The impact of a single IT failure on the top or bottom line of a business cannot be measured by just calculating the loss to revenue. Many business owners claim that they can afford to go down for an extended period, neglecting to consider consequences like reduced profitability and total business failure. But the truth is that no business owner wants to see the downtime. In order to understand this, let’s calculate how costly a single downtime event can cost your business.

We are producing more data than ever before. According to computer giant IBM, more than 2.5 quintillion bytes is produced every day and it’s growing fast. There were an estimated 6.4 billion connected “things” in 2016, up 30% from the previous year. We are also continuously sending and receiving data over digital networks. This unstoppable growth is unsustainable if we don’t act smart and manage the chunks of Big data that we all produce, store, and constantly share.

Did you know a lot of people have lost Bitcoins worth in tens of thousands of Dollars which could have been prevented by proper safety precautions? Because of popularity, you need to focus on security measures to keep your wallets and investment portfolios safe. Think of it, if you have a weak link in your crypto security, it wouldn’t take much to hack the wallet and move your assets.