Steps to Create an effective Disaster Recovery Plan

Disaster Recovery

Download your Disaster Recovery Template

What we learned or was forced to learn in South Africa was that power is not always a given and it can go off at any time. With power being unstable businesses had to look at alternatives to ensure their hard-earned data is protected when the lights go out. For this reason, more and more customer looked at systems that can be recovered in an instant with limited to no downtime.

Continue reading “Steps to Create an effective Disaster Recovery Plan”

How to Prevent Employees From Falling For Phishing Attacks

phishing

According to the 2019 Verizon Data Breach Investigation Report, a full third of cyber attacks involve phishing tactics. While there is evidence that employee education and phishing prevention solutions are effective in stopping basic phishing attempts, attackers have responded by making phishing emails more sophisticated and convincing. Examples include targeted spear phishing messages based on victim’s social media posts, phishing via text messages, sextortion, and creating fake login pages for legitimate web sites. Users are always the weakest link in security, and that’s why it’s more important than ever for organizations to train their employees to spot phishing attempts.

Continue reading “How to Prevent Employees From Falling For Phishing Attacks”