Securities

Posts relating to Securities of all natures covering website security, data security, network security etc

Password protection

Password protection, is your password secure enough?

Password protection is essential to avoid hackers into your private and personal data. On Tuesday, the password-management company SplashData released its annual list of the most popular passwords of the past year. SplashData took a look at the more than 2 million passwords that got leaked last year, analyzing the most commonly leaked passwords and those …

Password protection, is your password secure enough? Read More »

How to Protect iPhones and iPads from Cyberattacks

How to Protect iPhones and iPads from Cyberattacks

Apple has built a solid reputation for producing secure mobile devices. Some of the tech giant’s customers believe that Apple products are so secure that they do not need to take any additional security measures. However, Apple’s mobile devices are not without their flaws. There are known vulnerabilities in the iOS operating system and in …

How to Protect iPhones and iPads from Cyberattacks Read More »

Managed Services

Reasons for Managed Services in 2016

As cited in CompTIA’s 4th Annual Trends in Managed Services report, “the global managed-services market is predicted to grow to $193B by 2019, at a Compound Annual Growth Rate (CAGR) of 12.5%.” What is fueling this impressive level of adoption? Why are so many business owners fans of your business model? We dug into the …

Reasons for Managed Services in 2016 Read More »

Innovation

What´s stopping innovation?

Innovation is the driving factor in our today´s economy and has to be engaged in. However, there are some factors in our society that are preventing innovation from taking place at a faster speed. A study of innovation and data use A study conducted by Intel and Harris Poll discovered that there is a distrust against data …

What´s stopping innovation? Read More »

Email Mistakes

Email Mistakes That Can Cause Serious Data Security Breaches

Email mistakes caused by careless human error is one of the main causes of IT mail problems. Many companies know how disastrous these mistakes can be. As the Ponemon Institute’s 2014 Cost of Data Breach Study pointed out, nearly one-third of all data breaches were caused by careless human error. Email mistakes in particular stand …

Email Mistakes That Can Cause Serious Data Security Breaches Read More »

cyberthreat

Cyberthreat Affecting 950 Million Mobile Devices

Cyberthreat vulnerabilities are everywhere. Cybersecurity firm Zimperium announced in July 2015 that it had discovered a major vulnerability in Google’s Android mobile operating system. The flaw potentially allows hackers to access approximately 95% of all Android smartphones and tablets. That adds up to around 950 million mobile devices that are at risk. A Uniquely Dangerous …

Cyberthreat Affecting 950 Million Mobile Devices Read More »

IT Budget

Planning your 2016 IT Budget

Planning for success is nice in theory, but it’s hard for any business, especially in South Africa. Everyone knows the term “if you fail to plan, you plan to fail.” The reason everyone has heard that term before is because planning and budgeting is critical for business success. Here at Multi we believe an IT …

Planning your 2016 IT Budget Read More »

What Surveys Say about Moving to the Cloud

Cloud computing has surged in popularity. The 2015 Cloud Security Spotlight Report clearly makes this point. More than 70 percent of the 1,010 participants reported that they use or plan to use a cloud computing solution. Yet, some organisations are still apprehensive about using the cloud. Common Concerns Organisations hesitant about cloud computing are often …

What Surveys Say about Moving to the Cloud Read More »

4 Steps for Creating a Business Continuity Plan

Developing strategies for business growth is a cornerstone of the modern organisation. Developing strategies to help avoid business loss is just as important, which means business continuity plans are critical. These documents provide detailed plans on how to keep essential operations running during an emergency in order to minimise losses. Some organisations call these documents …

4 Steps for Creating a Business Continuity Plan Read More »

The Top Ten Tips to Protect Yourself from Malware

1. Do not open suspicious looking emails or click on URLs / hyperlinks in such mails. This cannot be stressed enough and is still a major reason for infection. If in doubt, delete! For businesses it is worth employing third party cloud-based email hygiene subscription services (such as our email software). These scan emails before they are delivered. They …

The Top Ten Tips to Protect Yourself from Malware Read More »

Scroll to Top