So your ex-employee leave the company on bad terms and he/she did one of the following to the email with her

Case 1 – The ex-employee deleted some email a few days or week before her last day?

Case 2 – The ex-employee set a password on the email PST file, then claim to have forgotten or has never set any in the first place?

Read more

With 1 month to go, we are fast reaching 14 July, the deadline Microsoft has set for End Of Life for Windows Server 2003. Despite Microsoft warning about EOL for Windows Server 2003 as early as April 2013, many organisations are yet to begin their migration away from the server platform. For a product’s EOL,  Microsoft is no longer going to support or update it anymore. But really what does this mean for SMEs and business owners?

Read more

Last week we speak about the scammers that claimed to be from Microsoft Tech Support who wants to get access to your computer to run all sort of nasty things on it. This week we will look at some of the case studies

Read more

One day you got a pop up on your screen with the words –  “A virus has been detected on your system, please contact Microsoft at xx-xxxx-xxxx”

OR

You got a call “Hi Sir,Mdm. This is calling from Microsoft support. We have detected a virus on your system and will need to access your computer to remove it for you”

What do you do then ?

  1. Contact Microsoft and let them solve your virus problem
  2. Ignore them and carry on as normal
  3. Wonder what happen to the free anti virus you were using
  4. Get your trusted IT provider who has been taking of your IT to handle this

Read more

Many businesses and companies rely on data, network and computing for their very survival. While this has become normal occurrence in today’s information age, the risk of losing important data could mean losing tens of thousands of dollars in an instant. Having an operational critical server breakdown could mean losing everything in the ever-changing game of business.

Read more

Pop quiz. Right now, without looking. How many servers and computers are on your network? How many of them are supposed to be there? Are their Anti Virus (AV) and security patch all updated? No idea or unsure? This is an ever present problem with companies and businesses that do not have their own IT department. So what are you doing about it?

Read more

A virus that targeted Craigslist job posting has been on the rise recently. This particular malware campaign has been enjoying a fair bit of success because the attacks are specifically aimed at businesses that use Craigslist for job recruitment. Cyber-criminals search for job postings, then send a fake response to the ad with the attached résumé (often in the form of a Word document). This type of social engineering are also applied to other job posting platforms where HR executives are expecting emails from potential recruits.

Read more

Nowadays, almost everyone relies on technology and the Internet. From online games to office work, almost anything and everything can be done using a computer. Many business establishments also rely on the computer by storing some of their most valuable records and information in their computers. Unfortunately, many companies and enterprises fail to recognize the importance of backing-up important files and records.

Read more

Your identity has quite a lot of value, especially in the wrong hands of an identity thief. Security firm ZoneAlarm put together some numbers in 2011 concerning identity fraud, and it even shocked us. Let’s talk about a few of these statistics and what it means.

Read more

As technologies advances and we become ever more connected, files and data sharing in Singaporean businesses is more and more common even if they are large in size, especially with international collaborations. (Refer to our past articles on how to share large files Part 1 and Part 2). Without a doubt it has make collaboration between parties easier, but at the same time it raises security issues within a business when files are being shared out external so easily.

Read more