margjordan

How safe is your data when your staff works from home?

How safe is your data when your staff works from home? Cybersecurity in a post pandemic world

The Coronavirus crisis has changed the world as we know it. With social distancing, lockdowns and work from home becoming the new normal, cyber criminals are exploiting the situation to their gains. This whitepaper discusses how the cyber crime landscape is likely to shape up in the post-pandemic world and how businesses can safeguard themselves […]

4 things to do to ensure your business continuity planning is a success

4 things to do to ensure your business continuity planning is a success Business continuity planning A must have not a luxury

Working on creating a contingency plan for your business? That’s great! Here are 4 things you need to consider when preparing your new business continuity plan. Audit of your business continuity plan Having a business continuity plan alone is not enough. You need to audit it at regular intervals to ensure it is up-to-date and […]

What are the essentials of a business continuity plan?

What are the essentials of a business continuity plan? Business continuity planning A must have not a luxury

An unexpected emergency can wipe out your business! A business continuity plan can help it survive. But, what should a good business continuity plan cover? Read this blog to find out. A list of your key contacts One of the most important elements in your business continuity plan is a list of all your important […]

3 Reasons to prepare a business continuity plan if you haven’t done so already

3 Reasons to prepare a business continuity plan if you haven’t done so already Business continuity planning A must have not a luxury

A business continuity plan is the blueprint you need during an emergency to keep your business running smoothly. If you don’t already have one, here are 3 key reasons why you should focus on creating one ASAP. It helps retain clients As a business, if you have problems functioning, it will definitely affect your clients. […]

Business continuity planning: A must-have, not a luxury

Business continuity planning is not an alien concept anymore. In recent times we have witnessed a lot of events that only serve to further intensify the need for business continuity planning. Examples include natural calamities like hurricanes, floods, wildfires, events like terror attacks or even pandemics like the recent Covid-19 outbreak. While a business continuity […]

Cyber hygiene: The key to your business’s good cyber health

Cyber hygiene: The key to your business’s good cyber health hacker

We all know that basic hygiene is a must to lead a healthy life. Did you know that the same rule applies to IT as well? There’s something known as cyber hygiene that plays a key role in keeping your business healthy from the IT perspective. So, how do you ensure your business doesn’t fail […]

Free Internet Access? Don’t fall for this one

Free Internet Access? Don’t fall for this one Free Internet Access? Don’t fall for this one

One of the popular internet scams that has been doing the rounds since 2017 is the one about “Free Internet”. This scam seems to resurface and somehow manages to claim quite a few unsuspecting victims. Here’s how they catch you. Ads are created on Google, Facebook, popular search engines and social media platforms advertising free […]

Online shopping? Watch out for these red flags

Online shopping? Watch out for these red flags Online shopping? Watch out for these red flags

Who doesn’t like online shopping? Online shopping has opened up a whole new world to us. Get whatever you want, whenever you want, without wandering from store to store. It doesn’t matter if it is too hot to venture outside or if there’s a blizzard out there, you do your shopping from the comfort of […]

DNS Cache poisoning: What every SMB must know

DNS Cache poisoning: What every SMB must know DNS Cache poisoning: What every SMB must know

In one of the most common poisoning attacks, the attacker poisons the DNS Cache with the aim of leading visitors to a fake website. In a DNS cache poisoning case, the attacker gains control of the DNS server and then manipulates cache data such that anyone typing the URL of the actual website is redirected […]

Protecting yourself against poison attacks

Protecting yourself against poison attacks Protecting yourself against poison attacks

Data poisoning by way of logic corruption, data manipulation and data injection happens when the attacker finds a way to access your data set. The kind of poison attack varies depending on the level of access the attacker is able to achieve Here’s what you can do to ensure such access is prevented. The data […]

Poison Attacks: A quick overview

Poison Attacks: A quick overview Poison Attacks: A quick overview

Smart technology is everywhere. Not just in our offices, but even in our day-to-day lives with tools like Google Home and Alexa becoming a commonplace. With technology becoming smarter every minute, the risks are increasing by the minute as well. Cybercriminals are finding new ways to corrupt our IT networks to disrupt our businesses, hold […]

Employee training and Cybersecurity

Employee training and Cybersecurity Employee training and Cybersecurity

Employee training will form a big part of the cybersecurity initiative that you will take on as an organization. You need to train your employees to identify and respond correctly to cyberthreats. Here are some employee training best practices that you can make a part of your cybersecurity training program. Create an IT policy handbook […]