Cybersecurity: It’s Everyone’s Job

Sebastian Abbinanti Perspectives

Cybersecurity is a big part of my job and something that sits in the front of my mind. Every time I receive an e-mail or follow a broken link, I think of the security implications. Anytime I type my name and e-mail address into a website, I wonder to myself, “what if this site gets hacked?” Does that make me …

Social media at work what could go wrong?

Regina Christensen Perspectives Leave a Comment

As a business, there is no doubt today that you need to make your presence felt on major social media platforms such as Facebook, Twitter, Instagram and LinkedIn. But social media also exposes you to cybercriminals. In this post we talk about the steps you can take to ensure your social media account doesn’t become a gateway for cybercriminals to …

Multi-Factor Authentication 101

Regina Christensen Perspectives Leave a Comment

You have probably already come across the term multi-factor authentication. The concept is not new, but has caught on really quick of late. In this post, we will discuss what multi-factor authentication is and why you should be adopting it. What is multi-factor authentication? Multi-factor authentication is basically the use of more than one credential to gain access to data. …

Why MSP relationships fail

Regina Christensen Perspectives Leave a Comment

A lot of SMBs opt for managed service providers who can help handle their IT requirements, and for the most part, it works well. Almost everyone knows the benefits of having a MSP manage your IT. Increased cost savings, ability to focus on your business without worrying about IT, better IT support and expertise, and so on. But, there are …

Four reasons to opt for the co-managed IT services model

Regina Christensen Perspectives Leave a Comment

Co-managed IT services model is one in which the business has its own IT team, but still contracts with an external managed services provider for certain services. In this blog we discuss four benefits of a co-managed IT services model. Expertise Your in-house IT team may not have all the expertise needed to manage all your IT requirements. There are …

Best practices for data safety in a remote work environment

Regina Christensen Perspectives Leave a Comment

Do you have staff working from home? Of late, due to the Coronavirus crisis a lot of businesses shifted to the remote working environment. While it raises some data security concerns, they can be overcome by following a few best practices. Formulate rules You can start by formulating rules that define the extent and manner in which personal devices may …

How safe is your data when your staff works from home?

Regina Christensen Perspectives Leave a Comment

The Coronavirus crisis has changed the world as we know it. With social distancing, lockdowns and work from home becoming the new normal, cyber criminals are exploiting the situation to their gains. This whitepaper discusses how the cyber crime landscape is likely to shape up in the post-pandemic world and how businesses can safeguard themselves against it. One of the …