
Ryuk: the new ransomware giant
Organisations around the world have been hit by a new piece of ransomware known as Ryuk, which has been encrypting PCs, storage centres and data centres in what’s showing itself to be a carefully planned campaign.
Home » Archives for David Lees » Page 4
Organisations around the world have been hit by a new piece of ransomware known as Ryuk, which has been encrypting PCs, storage centres and data centres in what’s showing itself to be a carefully planned campaign.
Everyone’s backing up these days, and because most businesses are already linked to the Internet, backing up online is proving the easiest and most cost-effective way.
Whether you are starting a new business or running a well-established one, your company should have a comprehensively designed and implemented business continuity plan in place. When creating a business continuity plan or revising one, the best way to get started is to read some books on the subject.
At any given moment, there is some disaster, natural or unnatural, somewhere in this world where people are affected on a large scale. One does not have to be at the epicentre of an earthquake to suffer the repercussions of a disaster. Disaster can strike at any time and place and can affect businesses critically.
The real question is, are you going to have your organisation running around like a headless chicken or do you have a plan in place for when a disaster strikes?
Most small- and medium-sized businesses do not have proper disaster recovery or business continuity plans in place.
Russian cyber security firm Kaspersky Lab announced recently it will start moving its ops and infrastructure to Switzerland and that, to show its integrity and transparency, the relocation will be managed by a third party.
Choosing a backup provider isn’t an easy task, it may not be a massive capital outlay but the value of your data and the importance of it should not be taken lightly.
Bear in mind that without cloud backup you’ll need a budget for encryption software, for maintaining your hard-drives and the offsite location, and for getting the backups to the offsite location. Also, as your data grows you’ll need to purchase larger hard-drives and after years of use you’ll need to replace them.
In computer network security terms, endpoints are devices such as desktop computers, laptops, smartphones, tablets and printers used remotely or on site. They all link to the Internet and are the points from which you and your colleagues work and communicate.
Endpoint protection or security is a system that protects these endpoints from the threats in cyberspace – the endpoints are the only places where threats can enter and operate.
Monday to Thursday: 08:30 – 17:00
Friday: 08:30 – 16:30
General Support: +27 72 595 1066
Hosting Support: +27 76 102 9813
Disaster Recovery (DRaaS) Support: +27 79 799 1648
* An after hours fee is applicable
"*" indicates required fields
Learn all you need to know about Google & Yahoo’s new requirements for bulk email senders.
"*" indicates required fields
"*" indicates required fields
"*" indicates required fields
"*" indicates required fields
"*" indicates required fields
"*" indicates required fields
"*" indicates required fields
"*" indicates required fields
"*" indicates required fields