Are you following Best Practice in your Disaster Recovery and Business Continuity preparation?

Best practice Disaster Recovery (DR) and Business Continuity (BC) Planning. A man with Asian features prepares for a disaster. He has a bandanna and a military backpack. He is holding a keyboard in one hand and wearing a business suit and tie as well.

Disaster Recovery and Business Continuity are two much-discussed topics, with universal agreement among executives as to their importance.  In practical terms, however, most organisations’ DR and BC plans are not regularly reviewed for their currency or stress-tested for their ease of implementation in an emergency.

Here’s our guide to the best practice in setting, reviewing and regularly testing your DR and BC plan.

Online Threats – The 5 Most Vulnerable Job Titles In Your Staff & How to Protect Them

Most vulnerable job titles - information security

When it comes to online threats, certain job titles are more vulnerable than others. If you run a business, it is essential that you identify these vulnerabilities. It is also crucial that you have preventative measures in place to mitigate the risks of cyber attacks. In this post, we will cover the 5 most vulnerable

Phishing, Spear-Phishing and Whaling – same same but different. Here’s how…

What is a whaling phishing attack

Gone are the days of the benign Nigerian prince sending poorly worded emails that promise recipients untold millions just ripe for the taking … or so we thought. Decades after swindling countless victims around the world, the Nigerian Prince variant of phishing emails continue to lure the unwary. In fact, the classic bait-and-hook scam still

Spear-Phishing Prevention: Five Steps to Thwart Online Scams

Phishing prevention strategies

Spear-phishing isn’t going anywhere, and the malicious practice can pose a real threat on an organisational level. IT professionals should employ a multifaceted approach to phishing prevention, with thought given to education, infrastructure and social media practices. Follow these five steps to give your enterprise the best chance to defend all attacks. Check the Integrity