9th November: The Concept of Business Continuity: Why a Disaster Recovery Plan Isn't Enough Read more
We've all heard of a business being hit with an unexpected disaster, impacting on their ability to operate at a BAU (Business as usual) level. Digital disasters at global level companies such as Toll Group and Garmin have dominated the tech news recently, highlighting how quickly ransomware / cryptoware can spread across a network, causing the operations of a company to grind to a halt. Other digital threats such as hacking or phishing scams are a very real, daily threat.
It's not just digital threats that need to be considered, however. Fire, flood & theft can all be a major concern, if a company loses all of their data.
Stop & consider this for a moment. How would your business would cope if such an issue was to strike your company data?
We can help you lessen the impact of a disaster, & reduce the time to restore your operational capabilities with our various Disaster Recovery solutions.
Not all disaster recovery solutions are created equal, & There's a good chance that an 'out of the box' solution won't completely fit the needs of your business. With some products, recovery can take many hours, or even days. Don't risk your business to an incomplete solution. Your Disaster Recovery implementation should be tailored to your situation & infrastructure, including elements such as;
Here are some key points to consider when selecting a DRaaS provider that will meet the critical needs of your business.
Unfortunately, people will always be a weak point in any business security. It's an uncomfortable truth that no one is infallible, & it's not always an intentional choice that someone makes that can cause an issue.
Social Engineering & Phishing are quite different. Social Engineering usually involves the offenders manipulating people into divulging information or taking inappropriate actions.
Kevin Mitnick is a famous convicted hacker turned computer security consultant. Many of the crimes he committed were via Social Engineering. In one of his books, he describes contacting various people inside companies & convincing them to divulge information such as usernames, passwords, IP addresses & more, just by posing as another employee over the phone.
Phishing is mainly performed via unsolicited emails that as masquerading as an important item. We've all seen emails purporting to have been sent from financial institutions asking for your client number & password, or other sensitive data. Sometimes these emails are very obviously fake, but there are times when they can be quite convincing in their appearance & wording.
It can also be conducted via Typosquatting / Cybersquatting. This is when someone builds a website with a common name but with a typo that is easy enough to accidentally enter (eg: www.gooogle.com). The wesbites are crafted to look almost identical to their legitimate entities, but will log the user data when entered.
It can be quite difficult keeping on-top of everything, & ensuring that the emails are legitimate. Some steps to consider are;
Our valued MSP partner, activIT Systems is our Cybersecurity training specialist. Where we can provide infrastructure, they can provide the training for your team for all aspects of security.
We've seen time & time again that a huge part of cybersecurity for businesses comes from management's mindset, & that a proactive cybersecurity culture protects your business like no piece of technology possibly can.
At activIT systems we emphasise educating our clients & their staff to help them understand the risks & how they can keep themselves safe.
We not only protect businesses with the best technology available, but also provide our clients & their teams with the tools & resources they need to make correct decisions about threats - from phish testing to incident response plans & policies, and free guides to staff training workshops'
- Steve Edwards, activIT Systems
At DC Two, we have the ability & capacity to offer any business, of any size from small to large enterprise, a scalable disaster recovery solution in a cost effective package.
Amongst a lot of options, we can - for example:
DC Two provisions all of our own services on or own infrastructure, across our own multiple datacentres located within Australia. We have local, friendly technical support available to you on any business day of the year.
We can provide you with a free advisory service, by looking at your critical business operational needs, discussing your concerns and tailoring a solution to fit your needs perfectly.
Don't wait & risk your company data to anything less than a complete solution. Contact one of our specialist team today to tailor a DRaaS solution for your specific needs.
DC Two is a company with whom we have an excellent working relationship. In the past two years, we have been rapidly growing our business with them. They are now one of our largest customers in WA and for good reason. Not only are they are technology experts, they also recognise that technology exists to support a business outcome. They are easy to talk to and are willing to listen when exploring new ideas. I have found them to be responsive, honest and trustworthy and I would not hesitate in recommending them as a potential business partner to anyone.
- Gary Roberts, Digicor