Is your business ready for cyber litigation?

Is your business ready for cyber litigation?

When household brands suffer data breaches, you’re on notice that your business could be the next potential target for cybercriminals.

This has the potential to impact your brand, reputation and worse. There are also regulatory and legal obligations in most jurisdictions that require you to safeguard and secure consumer data. Fail to do this and you risk exposing yourself to legal liability and even litigation from your partners, clients and customers.

Which laptop (for your SMB) in 2019?

Which laptop (for your SMB) in 2019?

SMBs typically watch every precious cent they spend, and IT hardware

And while it may be tempting to go for a cheap and cheerful model, the last thing you want is an underpowered laptop that doesn't have all the features you need, or is obsolete in a year or less. The key is to choose a machine that is durable, secure, powerful, lightweight and has all the features you need. does not come cheap – especially when it involves laptops. This makes choosing the right laptop for your business an important box to tick.

State of cybersecurity 2019

State of cybersecurity 2019

Cybersecurity outlook for 2019

We all know data is valuable, but too often we act as if it isn’t. Valuables are often secured – kept in safes, insured, treated with care. With valuable business and personal data moving around the internet all the time, criminals are always looking for new ways to steal, copy and subvert this precious new resource.

Keep your business safe with a backup and DR strategy

Keep your business safe with a backup and DR strategy

Every business needs a comprehensive backup and disaster recovery (DR) system in place to safeguard its digital assets. Statista estimates that server downtime costs nearly one-quarter of businesses (24%) lose up to half a million dollars per hour, while nearly one-sixth (14%) lose up to $5 million per hour. These are big numbers, but backup and recovery needn’t be a big problem.

IoT: How manufacturers can get started

IoT: How manufacturers can get started

Interested in exploring how a manufacturing operation can become IoT-enabled and the potential benefits of this technology?

The internet of things (IoT) is revolutionising the way businesses operate, helping them work smarter and more efficiently. Access to data is the key to garnering insights that can help your operation increase efficiencies and streamline operations, but you need to know what data to track and which processes need to be improved.

5 things to love about virtualisation

5 things to love about virtualisation

Virtualising your IT environment makes it cheaper and easier to deploy new capabilities to your stakeholders. By concentrating your storage and compute on servers (often hosted by a cloud provider), and deploying virtual machines (VMs) to users, you can reduce the cost of your desktop machines, centralise management and deployment, simplify security and governance, and offer new capabilities faster.

3 key factors in cloud security

3 key factors in cloud security

Everybody loves cloud services for their utility and accessibility. How about their security? It remains a concern for private users, small businesses and global enterprises alike. Leviathan Security Group research has identified three key factors in the effectiveness of cloud security: availability, staffing and vulnerability management. Only by considering, and carefully managing, all three can you be confident that your business is as well-protected as possible. 1. Availability First, check with your cloud provider just where your data will be held. Leviathan...