News

Stay up to date with industry news. Let us know if there is something specific that you would like to know about. And of course, feel free to share.
Featured image for ““123456” Once Again Claims Top Spot For Worst Password of The Year”
24/12/19

“123456” Once Again Claims Top Spot For Worst Password of The Year

Other poor choices include “password,” “princess,” “qwerty,” “iloveyou” and “welcome,” according to the 2019 list from SplashData. Admit it, you’ve used one of those known to be simple, hackable passwords at some stage of your life. It’s an understandable temptation, being quick and easy to remember. This would explain why so many people use bad passwords, while knowing better. Notably,...
Read More
Featured image for “Cyber Security – How Safe is Your Business?”
16/12/19

Cyber Security – How Safe is Your Business?

We all know that cyber-crime is an ever increasing worldwide threat, one with a series of notable incidents occurring throughout 2019, which prove how easily a data breach can affect any organization or establishment. One of the most memorable hacks that occurred this year must be when Quest Diagnostics, a clinical laboratory announced, “that an unauthorized user had accessed data...
Read More
Featured image for “Essential Settings for EOP and Office 365 ATP security”
02/12/19

Essential Settings for EOP and Office 365 ATP security

Techtron has been migrating to and managing Office 365 enviroments for some time now.  One of the most common scenarios we find is companies have left many of the security features set to default, which according to Microsoft and other leading experts is not recomended.  These settings are often neglected because everything seems to “just work” out of the box. ...
Read More
Featured image for “The Latest Office 365 Editions: What Business Owners Need to Know”
29/11/19

The Latest Office 365 Editions: What Business Owners Need to Know

Just a month after Microsoft launched its new subscription-based Office 365 Home Premium for individual users, the company rolled out a major update to Office 365 for enterprise users, too. As with any major tech release, Microsoft has had its fair share of supporters and detractors. Most of the negative articles were focused on their licensing changes. Whether you find...
Read More
Featured image for “Demonstrating Compliance with Data Security Regulations Can Be Easy if You’re Prepared”
14/11/19

Demonstrating Compliance with Data Security Regulations Can Be Easy if You’re Prepared

In our final blog in this series on how passwords help you protect your most important business data, We look at how rock-solid password management can also protect you from legal trouble. These days, most businesses are subject to data protection laws or regulations of one kind or another. Some come with pretty stiff penalties. To help demonstrate you’re compliantwith...
Read More
Featured image for “Do You Know Who Has Access to Your Systems?”
11/11/19

Do You Know Who Has Access to Your Systems?

This blog gets at a really important topic for businesses, especially smaller businesses that don’t have a lot of extra resources for dealing with IT admin. Using a centralized access control system to make sure your systems aren’t accessible by people who have left your company is really important to overall security. The last time an employee left your business,...
Read More
Featured image for “Stay Ahead of Hackers by Changing Your Passwords”
07/11/19

Stay Ahead of Hackers by Changing Your Passwords

We’re continuing to explore the topic of passwords and how they help keep your business data and systems secure in this next blog on when and how you should update your passwords. An alert pops up on your computer: It’s time to change your password again. Sigh. Fine. You’ll just change from password4! to password5! and— Not so fast. Regular...
Read More
Featured image for “Strong Security Starts with Strong Passwords”
05/11/19

Strong Security Starts with Strong Passwords

We have been thinking a lot about client security lately. When we came across this blog series about passwords, we knew we had to share it with all our clients. It’s all too easy to think passwords are a nuisance—when really they’re essential to keeping your data and your business safe. If you use the same password for multiple systems—online...
Read More
Featured image for “Data Backup Essentials – What Every Company Must Know”
01/11/19

Data Backup Essentials – What Every Company Must Know

Any loopholes in managing company data can have serious consequences. Take, for example, Morgan Stanley which had to pay up financier Ronald Perelman a whopping $1.45 billion, in part because the global giant could not produce all the critical email communication during the trial’s disclosure phase. Whether yours is a small, medium-sized, or large business, you must put the necessary...
Read More
Featured image for “Unsecured Adobe Server Exposes Data for 7.5 Million Creative Cloud Users”
29/10/19

Unsecured Adobe Server Exposes Data for 7.5 Million Creative Cloud Users

The U.S. multinational computer software company Adobe has suffered a serious security breach earlier this month that exposed user records’ database belonging to the company’s popular Creative Cloud service. With an estimated 15 million subscribers, Adobe Creative Cloud or Adobe CC is a subscription service that gives users access to the company’s full suite of popular creative software for desktop...
Read More
Featured image for “Multiple Security Flaws Found In Cisco Aironet Access Point Software”
23/10/19

Multiple Security Flaws Found In Cisco Aironet Access Point Software

Cisco has disclosed 13 big security vulnerabilities in its most recent software security advisory for Cisco IOS and Cisco IOS XE. The company said that all administrators should review their devices to determine which version of this software they are using. Running an outdated version could mean their devices are exposed to some of these vulnerabilities, said Cisco. According to Cisco, these...
Read More
Featured image for “‘Tarmac’ Virus Enters your MacOS as ‘Pop-ups’”
23/10/19

‘Tarmac’ Virus Enters your MacOS as ‘Pop-ups’

A new form of malware, dubbed ‘Tarmac’ is making its appearance on Mac devices. What is Tarmac malware? How does it work? Tarmac is a ‘malvertisements’ or malicious ads discovered by security researchers. Tarmac malware is also known as OSX. Tarmac is actually a companion of Shlayer, an older program. The two viruses work together to infect MacOS users with spam advertisements....
Read More

Join our mailing list

Please phone or email us, or if you would prefer to just receive news and updates, please submit your email address below.