Upgrade now to Windows 10 for better security

As I watched the news and read various news articles relating to the WannaCry ransomware attacks over the last few weeks, I was struck by the details that emerged about large organisations using old, unsupported versions of Microsoft Windows desktop operating system (such as Windows XP). Windows XP was a very reliable operating system, and [...]

Are you eligible for the $20,000 asset write-off scheme?

Small business instant asset write-off scheme When Scott Morrison handed down the Budget 2017-2018 this month, it was to the mantra “about making those right choices, to secure the better days ahead” But what does this mean for small businesses? Good things if you’re in need of upgrading or adding new assets for the organisation. [...]

Don’t get harpooned by a Whaler…

"Whaling" is a social engineering attack achieved often with a bare minimum of technological assistance, a simple but effective scam where an organisation's authority figure such as a CEO/CIO/CFO is impersonated, usually by email, in order to authorise some form of illegitimate data or funds transfer. Some of the successful scams have been very simple, [...]

By | May 15th, 2017|Business Value, Managed Services, Security|0 Comments

Why you need to back up your mobile devices

There was a time when mobile phones were used exclusively for calling and texting. Now, they can do so much more. Regardless of your level of tolerance or skill for managing documents in such a small gadget, mobile devices allow you to send and receive email, download and upload media files, store data, and even [...]

Security, the key reason for Windows 10 migration

Why is Windows 10 migration so important? One of the key reasons is Security... Security improvements is the leading driver for enterprises to migrate to Windows 10 on PCs, according to a study by Gartner. The report found that 49 percent of respondents cited security improvements as the reason for deploying Windows 10 in their [...]

Mandatory data breach notification scheme…

Are you taking “reasonable steps” to protect your customer’s data? Within 12 months you will be required legally to report data breaches that occur within your business. Review our tips on how to avoid data breaches in the first place and what will be required in the event of a data breach… What is the [...]

By | April 27th, 2017|Business Value, Managed Services, Security|0 Comments

How healthy is your Active Directory?

Active Directory (or AD as it’s commonly referred to in the IT world) is the centre piece of your Windows network’s security, but if you’re like most people, you’ve probably never heard of it. If you have heard of it, chances are it was only mentioned by your IT provider in vague terms – something [...]

By | April 6th, 2017|Business Value, Managed Services, Security|0 Comments

Diamond Ransomware Webinar Series – Now Available

The effect that Ransomware can have on your organisation can be devastating. Our two-part Ransomware Webinar Series hosted by Diamond Director Martin Thurgate will help you learn about the growing threat of Ransomware, along with techniques to help you minimise your network vulnerabilities. Start with the overview of the growing threat of Ransomware including real [...]

By | April 4th, 2017|Business Value, Managed Services, Ransomware, Security|0 Comments

Is your Remote Desktop Server (Terminal Server) secure enough?

It’s no secret that cyber-crime is on the rise, and that all organisations – not just large corporates and enterprises – need to take steps to secure their IT network. Almost all organisations now have the basics covered, such as anti-virus software and hosted anti-SPAM systems. Many are now also realising the importance of perimeter [...]

By | March 15th, 2017|Business Value, Managed Services, Security|0 Comments

What exactly is preventive cyber-security?

There has been a movement among technology providers to promise “proactive” cyber security consulting. Small-and medium-sized businesses love the idea of preventing cyber-attacks and data breaches before they happen, and service providers would much rather brainstorm safeguards than troubleshoot time-sensitive downtime events. But it’s not always clear what proactive cyber-security means, so let’s take a [...]

By | March 3rd, 2017|Business Value, Managed Services, Security|0 Comments