Get expert advice
e.g. What is the best way to market my cleaning business on the Internet?
Ask question
Server, networking and security

Comparison of Virtual Server and Dedicated Server

A few years seem like a long time in the IT industry. It may seem like ages ago when nearly every... read more

Added by:
Please login or sign up to comment.
Be the first to comment
Server, networking and security

Maximize your office functions with Microsoft

Working with multiple applications is such tacky considering the amount of time spent in operating... read more

Added by:
Rob Herr Marketing at Accede Holdings Pty Ltd
Please login or sign up to comment.
Rob HerrMarketing at Accede Holdings Pty Ltd
Thanks to you too Wendy!
Wendy HuangFull Time Blogger and YouTuber at A Custom Blog in 4 Minutes
Thanks for this article Rob :)
Server, networking and security

Heartbleed bug - security flaw exposes millions of passwords

http://www.cnet.com/news/heartbleed-bug-undoes-web-encryption-reveals-user-passwords/ "A flaw in... read more

Added by:
Please login or sign up to comment.
Wendy HuangFull Time Blogger and YouTuber at A Custom Blog in 4 Minutes
Oh wow! Interesting article Fleur
Server, networking and security

The Year Ahead In Cyber Security: What You Need To Know

What can you do to keep your business safe from hackers? (image: Dustball on Flickr) 2013 was a...read more

0
Added via
Please login or sign up to comment.
Be the first to comment
Questions

How do you identify and prevent dastardly digital downloads?

During any special event or holiday, malicious hackers often pull out old reliable tricks of the... read more

Asked by:
Cassidy Poon Head of Digital & Social Media at LogicalTech Group
Swee Yeo
A good anti-virus software is important. Avast is a free antivirus which prevents you from going to dodgy web sites or receiving virus/trojan attachments. Endpoint protection (see above) is an inexpensive enterprise solution. (PS: I do not know Shaun or IT Systems Solution but I know Endpoint Security.) Note: Firewalls are mandatory and a must. However, the new breed of malware can tunnel thru firewalls. So a good security system has to have several layers. I no longer use "Zone Alarm". I use Avast for home computers but will use Norton or Endpoint for business computers.      
Use something like our http://www.itsystemsol.com.au/index.php/msp/endpoint-security which will prevent problems happening at all levels, virus, firewall and application control.
Please login or sign up to answer.
Server, networking and security

Managed service professionals: the better option for SMEs

A business of any size that fails to manage its ICT is a real threat to the data of individuals. ... read more

Please login or sign up to comment.
Be the first to comment
Server, networking and security

The fukushima disaster and cybercrime: how criminals exploit your most generous impulses

It is a well-known fact that events of a global interest are exploited by cyber criminals for... read more

Please login or sign up to comment.
Hi Neil Thanks for the kind words. I hope that others get the same level of understanding from my articles as most of them are based on the idea that education - especially in our understanding of the internet and the WWW is critical to us going forward
Neil SteggallPartner at Wardour Capital Partners
Hi Roger, I think your last three paragraphs convey the risks so well and underline the need for vigilance whilst on line. In an article I posted at the weekend I commented how amazing it is to be connected to so much data, information and knowledge within a few clicks from any where on the planet. I guess we need to navigate our way through the dangers of on line life much as we do when driving our cars at speed along a real highway. Articles such as yours are great educators and timely prompts for those of us who think we know what we are doing.
Server, networking and security

How do we protect our children when we don’t understand cyber space ourselves

Technology has changed the world.  From cloud computing to GPS, from tablets to mobile apps, we... read more

Please login or sign up to comment.
Be the first to comment
Server, networking and security

Here's a new one for you - Bring your Own Cloud (BYOC)

So, recently we were doing some work on a client’s site—small site, 20 users—and we were installing... read more

Please login or sign up to comment.
Be the first to comment
Server, networking and security

Individual Cyber Security Health Check - Get yours now!

Everyone uses the internet in some way.   At home we're Facebooking or looking up recipes; on the... read more

Please login or sign up to comment.
Ananda Raj PandeyOwner at GuestJet
Thanks for great article ,Roger. We all do these simple silly mistake without knowing the larger impact.
Server, networking and security

Busting some of those cyber security myths

How secure do you think you are when you are using the internet?  Even if the answer is “very,” you... read more

Please login or sign up to comment.
Wendy HuangFull Time Blogger and YouTuber at A Custom Blog in 4 Minutes
There are a lot of apps out there that are great at managing passwords especially if you employ VA's or outsource your activities. The user will never see the actual password but have the opportunity to copy and paste an encrypted version.
Hi John Keeping track of the huge number of passwords that we use can be problematic. We also, as a business have to keep track of a huge number of passwords that we use on clients sites. We use a product called password safe, it has the ability to keep the url, the username and password in a safe and encrypted format. it is easy to use and it can be installed on a pc / mac.
Server, networking and security

Dabbling in Cyber Security: Not the Best Approach

Cyber security is a problem that small and medium businesses and not-for-profit organisations... read more

Please login or sign up to comment.
Wendy HuangFull Time Blogger and YouTuber at A Custom Blog in 4 Minutes
It's a little bit scary to know that your whole identity can nowadays be tied to your computer and a good hacker can go in and access all your private files if you are not careful. In the old days of dial up internet Trojans and viruses are not as advanced as they are now, I don't even know what they are capable of!
Ling LeeDirector at Japanese Sword Auctions Australia
Thanks always for your informative articles Roger! The thing is, some people don't always have the resources to pay! Currently, I am investing my faith in NortonAntivirus. Cheap and easy!
Server, networking and security

Cybercrime: I Love Being Paranoid!

In today’s world, cybercrime and cyber-criminals are all around.  In most cases they are just a... read more

Please login or sign up to comment.
Hi Wendy. I agree that cyber security is always reactive. But if you think about it by increasing awareness and reducing the perception of trust we can turn it around into a proactive situation. The problem is that anyone and everyone has a digital footprint, maybe we can harness that into some sort of digital fingerprint to identify an individual. The use of the internet in crime will increase drastically mainly because that is "where the money is".
Hi LIng Lee, I will answer that with an experiance I had recently. I was looking for a program that would seperate a text file of 10,000,000 email addresses into 10 equal parts. I downloaded and installed 12 programs, some free, some "cracked" but all were infected with some sort of malware, back door or RAT. Whenever I am working on this type of thing I have a virtual computer that, although it is on the internet, is highly protected as well as it can be rebuilt from scratch without the loss of any information. This is the world of "Internet Free" When it comes to torrents, I have had too many bad experiances with clients installing torrents to not understand why there is a need to install them. I can understand the original idea behing them, when we were all on dial up internet connections, but in todays world they are one of the easiest ways for the bad guys to gain access to your computer
Server, networking and security

Since when has email been anything but a broadcast medium?

We all use email, and in most cases we have had an email address for many years.  My Hotmail (no... read more

Please login or sign up to comment.
John BelchamberOwner & Senior Consultant at Invoke Results
Excellent lessons/reminders for us all here Roger thank you.
Questions

How can I support my employees wanting to bring their own computing technology devices for work?

Asked by:
Phil Joel Director at SavvySME
Andrew TuckerOwner at ITonCloud
Skeeve, Your dream is no longer a dream :) In a hosted desktop environment everything is kept separate, no company data on the BOYD and therefore no personal data on the company servers. In the Windows environment all you need to do is ALT-TAB between the to environments and this applies to the Windows mobile devices as well. In the Mac world you would move between spaces and again this applies to the Ipad and even the Google tablets. I have a Mac and when I am at work or for that matter at home working I have my personal environment open in Desktop 1 (spaces) and my work environment open in Desktop 2 (if you have a mac you will have a better understanding of this).  When I am in the hosted desktop environment I have access to all my company data and printers etc no matter where I am traveling. For example I was in NZ traveling from the South Island to the North Island on the ferry. I was able to log into my hosted desktop on my Google tablet via 3G and was able proof read a document in Word make the changes (attach a diagram from Visio) and email it off. Close down the work environment and return to sending off a picture of the scenery to my family from my personal email using the native email client. 
Andrew EganOwner at Adept IT
Skeeve - the new Blackberry OS offers this. It has distinct "corporate" and "personal" partitions (for lack of a better word) that allows the enterprise side to be controlled by the enterprise, and the personal side to be offlimits to enterprise. This means the enterprise could wipe all the corporate data when an employee leaves, without damaging their personal information. to my understanding, there obvioulsy has to be some communication between the two sides but it's kept fairly separate..
Please login or sign up to answer.