TRENDS IN THE IT INDUSTRY

THE GENUSYS GROUP BLOG

Read Our Blog
Handcuffed by ransomware
Handcuffed by ransomware

5 Security Threats and How To Protect Your Business

If cyber criminals spent as much time on positive innovations as they do on harmful innovations the world would might be a better place. Unfortunately, that is not the case. The Gartner Group estimates that spending on Cyber Security will grow to around $93 billion this year and for good reason. It is estimated that cyber crimes have cost businesses and other organizations $50 billion in just the past 5 years.

With cyber attacks becoming more sophisticated, seemingly on a daily basis, protecting your business should be a top priority if it isn’t already.

Below are five threats that every business should know about and steps that can be taken to help protect against them.

Read more

Understanding Backup: Full, Differential and Incremental Backups Explained

Recently a situation arose that showed why understanding the differences between a full, differential and incremental backup and understanding the role of each in a backup strategy is imperative to avoid catastrophe.

Full backups take time and, if there is a lot of data, time and disk space. To reduce the amount of time and disk space a backup uses, backup vendors implemented differential and incremental backups. In the case mentioned above there was a large amount of data that didn’t change often so the owner of the data created a backup relying on incremental backups to save space. When we took over the account we reviewed the backup process. Sure enough the backup ran every day creating an incremental backup in half an hour. Everything appeared fine. No errors or notifications. It was a false sense of security. The reason why is at the end of the post.

Read more

Threat Report: 5 Facts To Be Aware Of For Your Business

Every year, Webroot analysts and threat researchers take a look at the cyber threat trends that have emerged over the previous year. Because they protect more than 40 million endpoints and have a threat intelligence platform capable of integrating information from billions of URLs, domains, IP addresses, files, and mobile apps, Webroot has the capacity to dive deep into the real-world threat landscape.

Their observations should be uppermost in business owners minds as they access the threats that their business face.

Read more

10 Questions To Start Focusing Your SMB On IT Security Best Practices

IT security concerns are a growing focus of many meetings we have with managers and business owners. The focus on IT security stems from two areas. 1) the constant drumbeat of news concerning hacks, databreaches and ransomware attacks. 2) questions and requirements regarding internal security practices are coming from insurance companies, banks and connected customers. Very quickly the need to be able to demonstrate that your organization’s internal security practices are up to par are becoming a requirement to do business.

For businesses that are finding themselves facing questions from customers and vendors we’ve put together a list of security questions that all businesses should review in detail with their IT service provider to begin to provide a strong baseline assessment to facilitate being able to confidently address their security concerns.

Read more

Is Your Email Security Effective?

Email, the life blood of many businesses. Without email business would screech to a halt. But, it is through this door that most compromising security threats come through. According to one email security vendor, Cyren Technologies, a gap analysis run on emails delivered to users mailboxes after passing spam and virus filters revealed a scary gap between what is presumed safe and what is actually safe.

Read more

Phishing Scams And How To Avoid Them

As a business owner, there are a plethora of cyber security threats that your business faces on a day to day basis. One threat that we constantly see are phishing scams. The scams are simple but, they are also highly effective at tricking a user into giving up private information. It doesn’t take much to compromise a system and even the simplest clue, such as a username and/or password can be all the information that an enterprising hacker needs to compromise your systems.

For this reason it is imperative that you and your employees be hyper aware of phishing schemes and the best ways to avoid them.

Read more

4 Reasons A Cloud Workspace Can Make Your Organization More Secure

If you ask CIO’s, IT service providers and business owners as to what keeps them up with worry, there is no doubt that security would be right at the top of the list. Protecting against hackers, ransomware, denial of service attacks, fraud or malicious employees the threats are real, evolving and seemingly everywhere. This is especially true for small-to-medium-sized businesses that lack the advanced security tools and expertise needed to combat these threats.

We’ve written before about ways to protect your business from the many threats that can hurt your business but how can moving your company to a cloud workspace help?

Read more

Back up, Disaster Recovery and Business Continuity Similar but Different

As we wrote about last week, cyber criminals are trying to attack your company through its IT infrastructure. Knowing that these attacks are a fact of life, a comprehensive business continuity plan isn’t just an IT concern it is a concern of all areas of the company. In last week’s post we talked about how backup is your company’s failsafe when all else fails. But, what kind of backup do you require?

Back up, Disaster Recovery and Business Continuity, the words are bandied about with regularity but as many business owners know, the definition of the terms can vary from publication to publication and IT Service Provider to IT Service Provider.

Read more

5 Areas of Cyber Security To Focus On For Your Company

On an almost daily basis the news contains a story about an IT security breach, a ransomware attack or system downtime caused by malware. As we read these stories it begins to feel as if there is little that can be done to protect your company from the seemingly endless threats that exist in the cyber world. It’s true, the attackers are clever, their methods of attack evolve quickly and what was protected yesterday may not be protected today. So what can you do to protect your company?

Before throwing up your arms in frustration remember that maintaining vigilance in very specific areas gives your company its best odds. Below I’ve listed five areas that all SMB’s should prioritize to minimize the chance of becoming a statistic.

Read more

What Is The Cost Of Downtime?

Downtime. Every business owner dreads the very real possibility, yet many tempt fate and try to skimp on their backup and disaster recovery planning in an effort to save on expenses.

Downtime, for the purposes of this discussion, is defined as the loss of access to your critical data for a period of time that significantly impacts your business operations.

When it comes to downtime there are two types of costs – direct and indirect. Direct costs are fairly easy to quantify like employee productivity, salary costs, missed customer deadlines and impacted sales. Indirect costs are harder to quantify but can include reputation damage, loss of faith of customers and and loss of potential new customers. These costs are much harder to put a finger on.

Take a moment and try to estimate what a significant downtime event might cost your business. Then look below to see what other business owners thought the cost of downtime was to their business.

Read more

Connect with The Genusys Group

Join our mailing list or ask a question.

Contact Us
close slider
Name(Required)
This field is for validation purposes and should be left unchanged.