Now that we're working from home and reducing visits to our customers, we need a new way to sign off on documents. It has become much more complicated to get people together, and as a result important contracts can be left in limbo waiting on a signature.
Blog Category - Security
Securely Work from Home
The new normal for almost all of our customers is to have at least 50% of their employees now working from home. For many, it's over 80% (Netcare for example).
Given the immediate rush to move everyone to some sort of remote working arrangement has passed, the next priority is to circle back around and make sure that our rapid introduction of work-from-home solutions hasn't compromised our business security.
Do You Know Your Microsoft Secure Score?
As a way to help their Windows and Office 365 users better protect their data from malicious cyberattacks, Microsoft offers Microsoft Secure Score. This is an overall score for data security compared to a recommended Windows baseline and Office 365 controls. It’s designed to help organizations gain insight into where they stand and take advantage of suggestions for improving their score.
Every Business Manager Needs to Know About The Essential Eight
With an understanding of the growing threats that companies face and the challenges of blocking data breaches on multiple fronts, the Australian Cyber Security Centre (ACSC) has published a prioritized list of eight essential data security strategies to help businesses protect their systems against attacks.
The 5 Critical Steps of IT Risk Management to Prevent a Data Breach or Costly Downtime
Most people can easily identify with the need to protect your business premises or vehicles from peril, because being without either would put your company’s well-being at a significant risk. But, what about your IT infrastructure?
The Internet is getting faster allowing businesses to implement cost-effective cloud hosted applications, rich media solutions and VoIP.
But it's also the case that the Internet is getting more dangerous. Hardly a day goes by now without the news media reporting another serious cyber security breach.
Dark Web Monitoring
The Dark Web is the underbelly of the Internet, where cybercriminals can anonymously trade the sensitive data of millions of companies. Dark Web monitoring is a service provided by ID Agent that searches the Dark Web for your businesses stolen credentials, to help prevent the risk of future cyber attacks.
With the Notifiable Data Breaches (NDB) scheme now in place in Australia, it is more important than ever to ensure your business is collecting and storing credit card information in a secure manner.
NetCare has recently introduced a PCI Assessment service to help your business protect cardholder data.
Security Awareness Training
Introducing NetCare Security Awareness Training, powered by Webroot - a relevant and engaging cybersecurity awareness training program. With 95% of successful cyber attacks being caused by human error, this training is specifically designed to help reduce the risk Australian businesses face by focusing on testing and educating employees.
Disaster Resistance and Recovery Planning
Disaster Recovery Planning (DRP) involves preparing and testing for recovery of technology infrastructure after a natural or human-induced disaster. Learn more about disaster recovery and resistance strategies from our list of technology problems ranked in order of their probability of occurring, along with recommendation on how to mitigate their impact to your business.