Are you following Best Practice in your Disaster Recovery and Business Continuity preparation?

Best practice Disaster Recovery (DR) and Business Continuity (BC) Planning. A man with Asian features prepares for a disaster. He has a bandanna and a military backpack. He is holding a keyboard in one hand and wearing a business suit and tie as well.

Disaster Recovery and Business Continuity are two much-discussed topics, with universal agreement among executives as to their importance.  In practical terms, however, most organisations’ DR and BC plans are not regularly reviewed for their currency or stress-tested for their ease of implementation in an emergency.

Here’s our guide to the best practice in setting, reviewing and regularly testing your DR and BC plan.

Email Phishing Scams Are More Sophisticated & Prevalent Than Ever

Phishing email scams featured image

According to Verizon’s 2018 Data Breach Investigations Report, 92.4% of malware is delivered by email. Up until now, phishing emails have been easy to spot because they come from suspicious email addresses and include poor grammar and formatting – when you think of a phishing scam, you probably picture one of those poorly worded emails

Government-Sponsored Mobile Malware Campaign Uncovered: Why You Need to Be Cautious with Mobile Downloads

Government sponsored malware. a man holds a mobile phone exfiltrating his data to another location

A mobile-targeted cyber espionage campaign dubbed ‘Dark Caracal’ has been uncovered by the Electronic Frontier Foundation and security firm Lookout. The scheme has been in operation since at least January 2012, affecting users in over 21 countries. EFF and Lookout have uncovered the actors of the scheme, stating that the campaign has been operated from

IoT security standards must be tightened to prevent successful attacks

Home Automation. A user holds a phone controlling many IoT devices

Forbes predicts that by 2025, we’ll have over 80 billion smart devices on the internet. Although IoT simplifies numerous tasks at work and home, there are a number of security risks that come with the technology. Anyone who purchases IoT appliances should be aware of these risks. The information in this post is adapted from

Wifi Security Flaw Detected that Leaves Devices Vulnerable – Patch Your Wifi Soon

Wi-fi security flaw

“All Your Wifi Connected Devices Are Potentially Vulnerable” That’s the conclusion from James Walker, MD of Computer One after reviewing international research that also prompted the US Department of Homeland Security to issue an official warning. What’s the story? Well, a wifi security flaw has been discovered and it’s serious. The flaw could be used

Humans make the best attack vector

Who? Me? - a businessman feigns surprise

Who?  Me? As a Managed IT Service provider looking at the state of affairs in multi-stage chained attacks we can say this: if you want to be an effective hacker, take a persuasive writing course. That’s also the lesson delivered in a report last week by US-based Proofpoint, a leading Security-as-a-service vendor shows that automated