One day Judy, head of the finance department, receive an email from her boss, asking her to transfer $100,000 to a bank in Hong Kong for a supplier. Her boss has often asked her to do such transaction and it does not appear to be an unusual request, so Judy go ahead and transfer the money over.

Until a few day later, the supplier call and arrange for his payment which shocked Judy as she thought she has already transfer the money to him. Consulting her boss, she then found out that the boss has never send her any email for the transfer. Upon checking the email, they realize the email was a spoofing email that looks very similar to the boss’s email except for 1 letter.

Does this sound familiar to you? This kind of spoofing attacks have been reported all over newspaper and business journal and yet people are still falling for it.

How can you protect yourself against it?

Read more

Just got a message in one of my whatsapp groups – “Anyone know how to recover help_decrypt ransom attack??”

Another victims of the infamous ransomware Crypto virus, and lucky he managed to contain it within the PC before it spread to the server. How the CryptoLocker virus works is that it encrypts the files on the infected computer then it will prompt a message box asking you to pay within a certain period (usually within 2 days). This is why they are classified as ransomware, they keep your information hostage.

Read more

As more and more people bring and use their own laptops, smartphone and tablet in office, the notion that company data is only on company computers and you can’t work without accessing them is slowly being eliminated. This of course vastly improve the productivity of the employees, however if the technology used by the company is outdated, whatever productivity gained is instead lost. At the same time, the increased mobility gained also open a can of worms – how do you ensure your data is safe and secured, and not accessible by unauthorized people?

We will be having a series that deal with productivity, mobility and security in the area of BYOD (Bring Your Own Device), how you can make the full use of BYOD in your company without being bogged down by them.

This week we will examine the 2 common email protocol which is the IMAP, POP3 and how they work to bring you email.

Read more

Backing up data to the cloud involves benefits unavailable with other options. Until the cloud existed, individuals and companies had limited choices for this vital responsibility. Available options often made this necessity a tedious and/or delayed process. This led to some people and organizations to overlook this important function.

Using a cloud backup system delivers multiple benefits and no major downsides. Among the benefits, the following typically are the most important to users.

Read more

When you open your email client (eg Outlook, Thunderbird etc) in the morning, is the first thought that goes through your mind “Let’s see what I need to take care for today?” which is then followed immediately by “Arg, so many junk email” when the streams of junk mail start flooding your mail?

Read more

Do you have long resolution time for your reported IT issues?

Do you feel you have no control over certain aspect of your business, especially when IT is involved?

Do you worry nobody may be able to help you with your IT issues?

Read more

So your ex-employee leave the company on bad terms and he/she did one of the following to the email with her

Case 1 – The ex-employee deleted some email a few days or week before her last day?

Case 2 – The ex-employee set a password on the email PST file, then claim to have forgotten or has never set any in the first place?

Read more

With 1 month to go, we are fast reaching 14 July, the deadline Microsoft has set for End Of Life for Windows Server 2003. Despite Microsoft warning about EOL for Windows Server 2003 as early as April 2013, many organisations are yet to begin their migration away from the server platform. For a product’s EOL,  Microsoft is no longer going to support or update it anymore. But really what does this mean for SMEs and business owners?

Read more

Whenever we get into a discussion around recovery SLAs, it always starts with the customer saying the same thing. Terms like “immediately”, “ASAP”, and “yesterday” come up, to which we start the discussion of what’s truly attainable.

What’s attainable really revolves around what you want to invest in keeping a system running in the first place; if you truly can’t afford a system to go down, perhaps looking into redundant systems or virtualization should be on the table first. But, assuming you are more interested in just having as fast a recovery as possible instead, there are two factors to consider:

Read more

You already trust the planning, installation, configuration and support of your company’s servers, data and workstations to a trusted provider (hopefully us) and now you’re thinking about what to do with recovery.

You probably have a pretty good handle on it – you’ve invested in a tape system, have a tape rotation schedule, even use off-site tape storage. But you keep hearing about outsourcing and wonder what all the noise is about. Providers like us are pushing cloudbased backup & recovery – some (like us) even use terms like “hybrid cloud” and this is all very new and uncertain.

Read more