“Ooops, your files have been encrypted!” That’s the dreaded message that greeted people hit with the 2017 WannaCry ransomware attack. Hundreds of thousands of computers were infected, and many people lost their computer files, money, and time and suffered immeasurable aggravation and embarrassment. It’s been a couple of years since then, and, experts agree, ransomware is still…
Category: Cybersecurity
The importance of Cyber Resilience
Cybersecurity refers to the processes and methods used to protect your organisation from a cyberattack; cyber resilience refers to your ability to deal with those threats. An organisation’s ability to operate, function and recover from an attack determines its level of resilience. Although it is a relatively new term, cyber resilience has always been the…
Important Privacy law changes that have an impact on you
Changes have been made to the Privacy Act . If you collect, store or use personal information about your employees and/or customers, you will have new obligations. The new Privacy Act took effect on 1 December 2020. The Privacy Act 2020 replaces the Privacy Act 1993. The key change for most organisations under the new…
7 Ways to Limit the Impact of Ransomware
From local government entities to large organisations, ransomware attacks are everywhere. It’s up to all of us to help prevent them from being successful. Ransomware is a type of malware that blocks access to a system, device, or file until a ransom is paid. Ransomware does this by encrypting files on the endpoint, threatening to…
Why you should be taking MFA seriously
It feels like every day, we hear about another data breach or ransomware attack against companies large and small. It’s one of the downsides of such rapid technological growth – just as quickly as cybersecurity professionals can increase defences, bad actors are expanding their attack arsenals. To decrease the risks, individuals and businesses alike must…
Critical Cyber Security Enhancements
What is myITmanager doing to help clients stay cyber safe? We have invested heavily in R&D over the last few months to improve our offerings and are implementing a number of key solutions that will significantly reduce the likelihood and impact of the most common cyber breaches. These changes will deliver what we consider is…
Office 365 Backup
Is your email backed up? Are all your company documents backed up? What would happen if someone accidentally or intentionally deleted all their emails and walked out the door? What would happen if a cyber criminal hacked your system and encrypted all you company files and documents? Why You Need O365 Backup! There’s a common misconception among users that backup…
Your Business is at Risk – Cyber Attacks are on the Rise
According to Microsoft… 58% of cyber breaches took place in small to medium sized businesses last year and 55% of businesses have experienced one or more attacks. At best a cyber-attack creates a massive amount of stress, disruption and cost for the business whilst identifying, mitigating, recovering and responding to a breach. This includes…
EDR – the modern AntiVirus! Do you have it in place?
In a continuation of our series of Security posts, this week we are focusing on EDR – Endpoint Detection and Response. The first question you are probably asking. What is EDR? Endpoint Detection and Response (EDR) is a new form of cyber security technology that helps continuously monitor, prevent, detect, and respond to ever-changing cyber threats and recover quickly when ransomware or other…
Phishing scams – don’t take the bait
Continuing our series of posts aligned to Cyber Awareness month, this week we are highlighting an increasingly common threat – Phishing Scams. Phishing is a cyber attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — a request…