Information technology risks range from the very apparent to the silent and hidden. The majority of businesses mitigate the most obvious risks: only an irresponsible IT operation will do without network firewalls in place or skip on regularly updating operating systems and software. Yet it is the less obvious risks which can trip up even carefully run IT functions – and which can cause progressive or indeed sudden harm to your business.
Based on the 2016 edition of Ponemon’s annual Cost of Cyber Crime report, phishing is now one of the most prevalent cyber-attacks today. Should you be worried about it? It depends. If you think any of the consequences of phishing attacks outlined below can impact your business, then maybe you should be.
Tarnish your company’s image
Most phishing attacks are designed to steal personal information. The way cyber criminals do this is by crafting legitimate-looking emails that compel recipients into disclosing their personal details.
You walk into your office tomorrow. Before you can get a cup of coffee, one of your managers tells you that your IT service contract is going to expire in two months.
You've been frustrated with poor service and technology for months. Now, you have an opportunity to improve the situation. Your IT manager stands at the ready with a few recommended IT service providers. Are you equipped to sort through the options and call them?
Before you sign on the dotted line to renew your IT service contract, go through these questions. Investing an hour today could save you months of effort, risk and frustration.
Acceptable practice or unacceptable risk?
Shadow IT is the practice of using technology within a business without the knowledge or approval of the IT function.
This includes anything from a single employee using a low-cost app, to an entire department, such as Project Management, adopting a cloud software application to support its Line of Business (LoB).
When you enter into a managed services agreement with an IT support provider, you’re likely driven by the potential cost savings, particularly in terms of labour costs. What you probably don’t realise is that, in addition to helping you save on costs, an IT support provider can actually play a very critical role in the success of your business.
DDoS attacks that force websites to go offline and cripple servers are nothing new, but many of the massive DDoS attacks last year, which also happened to be the biggest in history, had a common characteristic we’ve never seen before. They all originated from hordes of zombified IoT devices, also known as IoT botnets.
Because IoT devices are here to stay, this threat won’t be going away anytime soon. If your network includes websites and other Internet-facing applications, you need to understand what these threats are, how it can impact your business, and what we in the business community can do to protect our IT infrastructures from these types of attacks.
HTL Support lets clients get on with what they do best
At HTL Support, we aim to offer professional IT support services with a difference. The foundation stone of our business is to employ expert technology support technicians with good people skills. Our friendly IT Guys take the hassle out of supporting IT issues so you can get on with the thing you most desire - running your business and practicing what you do best in servicing your customers or clients.
Managed services credentials
The world is full of meanings, some explicit and some more subtle. In the language of business, there is a need to project a sense of credibility and trustworthiness. Just like qualifications and certifications are important in establishing the credentials of individuals, organisational accreditation is essential for determining the bona fides of a technology services provider.
Microsoft refuses US government access to data stored in Ireland
Despite a court order in 2014 ruling in favour of the US government, Microsoft is refusing to hand over emails stored at a data centre in Ireland alleged to contain details of narcotics sales. The US government position supported by the court is it could force the company to hand over data it controlled and stored abroad because it is a US-based business.