Monthly Archives - March 2019

ICTAA Level 3 Accreditation: Business Continuity

Business Intelligence Accreditation is for the forward-thinking business who won’t tolerate ICT outages and disruptions, this level will pull together various automated redundancies focused on increasing system availability so staff can operate without interruptions, we also will explore disaster recovery techniques and ICT security. As a forward-thinking business, you will develop ICT lifecycles that will help to navigate your future ICT requirements and this also works to ensure your ICT evolutions is heading in the desired direction. Some of the items [...]

ICTAA Level 2 Accreditation: Business Intelligence

Business Intelligence Accreditation is for the business who is focused on leveraging their ICT ecosystem to gain the greatest efficiencies, this level helps you to further streamline your procedures and reduce the unnecessary IT annoyances for example, we will explore your email systems and implement Spam mitigation and other security strengthening. We will also take a deeper look at your IT systems and discover ways to reduce outages and time to recover from disasters. Some of the items we cover [...]

ICTAA Level 1 Accreditation: Business Awareness

Business Awareness Accreditation is for the business who wants to get a snapshot of their current ICT ecosystem and establish solid ICT management frameworks within their business, we cover basic processes and various IT components, this incorporates documenting your assets and building up repositories of critical information. We also explore basic processes in your business for example, we will explore your data backup procedures and ensure that you have adequate protections in place to backup and protect your business data. Some [...]

Tips for Exploring UPS Battery Backup

Uninterruptible power supply (UPS) is a type of power supply system that contains a battery to maintain power to provide power to electronics in the event of a power surge or outage. Typically UPS power keeps a personal computer (PC) running for several minutes after a power outage, enabling you to save data that is in memory and shut down the computer gracefully. Many uninterruptible power supplies now offer a software component that enables you to automate backup and shut [...]

Tips for Isolating WIFI Clients

Wireless Client Isolation is a security feature that prevents wireless clients from communicating with one another. This feature is useful if you want to share WIFI with the public or you have a BYOD policy in your business, client isolation adds another level of security to limit attacks and threats between devices and gives you controls to preventing clients accessing your back-office servers, equipment and resources. This feature confines and restricts clients connected to the Wi-Fi network. They can’t interact [...]

Tips for Securing WIFI Networks

The good news is that it’s not too difficult to lock-down your WIFI networks, which will both prevent others from stealing your internet and will also prevent hackers from taking control of your computers through your own wireless network. Here are a few simple steps to help secure your wireless network: Step 1. Open your router settings page First, you need to know how to access your wireless router’s settings. Usually, you can do this by typing its IP address into your [...]

Tips for Enabling WIFI Encryption

In order to prevent other computers in the area from accessing your WIFI network and data, you need to encrypt your WIFI signals. You might already have this in-place however it wouldn’t hurt to double check your settings to ensure your protected. There are several encryption methods for wireless networks, including WEP, WPA (WPA-Personal), and WPA2 (Wi-Fi Protected Access version 2). WEP is basic encryption and therefore least secure and can be easily cracked easily and should NOT be used [...]

Major WIFI security upgrade, are you ready?

Let’s take a moment and talk about some upcoming changes to the WiFi standards, these changes will bring massive security enhancements – However there’s a couple of things you need to be aware of. Over the years, we have seen WiFi overtake wired networks as the preferred and simplest way to connect devices: Enterprises are using WiFi to connect staff and devices to corporate networks. Retailers using it for POS and tracking of stock movements in warehouses. Public “Free WiFi” solutions allow the [...]

Steps for: Implementing 4G for Internet Redundancy

In today’s business reliable access to the internet is your life blood, without internet you wont be able to send/receive emails and possibly be unable to process orders and run your normal operations, and if you running a phone system that’s using VoIP or SIP you will also be unable to take and receive calls which will not only annoy you and your staff, it will also prevent your customers from contacting you, which could possibly cause serious reputation [...]

Steps for: Choosing Anti-virus and Internet Security

John McAfee turned some heads in the security community a few years ago when he declared that the virus protection software industry, which he is widely credited with creating 30 years ago, is dead. “In 1987, new applications for the Windows platform were being developed and released at a rate of about one new application per month,” he wrote. “Today, there are over 10 million malicious apps.” In short, conventional antivirus techniques simply can’t keep up. Many security experts don’t agree. [...]