Entries by John Murray

,

Modernizing print security for today’s working world

Security is a top priority for many businesses, but the speed at which the cybersecurity landscape is evolving and the increasing sophistication of cyberattacks means a detailed understanding of where some of the biggest risks are coming from is limited amongst many CISOs and IT managers. By 2025, the cost of cybercrime for businesses is predicted to reach $10.5 trillion, […]

,

Emerging trends in data breaches and how to address them

Now, more than ever, it is crucial to prioritize investments in advanced threat intelligence, monitoring systems, and ongoing employee training. In 2023, there has been a concerning surge in data breaches. During the second quarter of 2023, over 110 million accounts were compromised, a staggering 2,6 times more than in the first quarter of the year. Recent findings reveal […]

5 Reasons to Upgrade Your Old Router

There is no specific length of time a router will last; your router doesn’t have an expiry date. However, it is generally accepted that a standard Wi-Fi router will last between five and ten years. As with all technology, numerous factors affect the lifespan of a router, such as how well it is looked after […]

Firmware updates: A vital aspect of business security

In the race against cyberthreats, every update matters. This includes the often neglected firmware updates. This article sheds light on why updating your firmware is an essential step in securing your business. What does firmware do? Before we dive into the significance of firmware updates, it’s crucial to understand what firmware is and its role […]

,

Is your password strong and secure?

A password is more than just an assortment of characters you’re required to enter in order to access your accounts. It is the first line of defense against potential threats and attacks. A weak password makes it easier for hackers or cybercriminals to gain access to your personal information, such as financial details or sensitive […]

How to mitigate remote work security risks

In recent years, remote work has become more popular. While this working arrangement offers many benefits, it also creates numerous security risks. This blog post will provide tips on how to improve your and your employees’ cybersecurity when working remotely. Create clear remote work policies Your company should have clear policies in place that outline […]

FBI Warns of Escalating Elderly Fraud – Here’s What You Need To Know

In America, more than 93,000 people fall victim to financial fraud annually. Whether you are a victim of identity theft, check fraud, email scams, ATM bank card theft, or another form of financial bilking, the results are devastating. For older adults, the devastation is swift and nearly permanent. Unfortunately, as technology advances, the FBI (Federal […]

,

Critical errors to avoid in your business continuity planning

A business continuity plan (BCP) can help your business mitigate the impact of unexpected disruptions such as natural disasters and cyberattacks, and keep your operations running smoothly. However, crafting an effective BCP requires careful consideration and planning. In the following sections, we’ll look at business continuity errors business owners should know and avoid. Incomplete risk […]