Disaster Recovery vs Backup: What is the difference?

Picture the scene: a staff member receives an email that appears to be legitimate. They click on an attachment in the email and within minutes their computer is encrypted. Because their computer is connected to your office network, before long all of your computers are encrypted. You have been the victim of a ransomware attack, something that happens on a daily basis for businesses up and down the country. To ensure this scenario does not play out in your business, you need a robust security solution. Disaster recovery and backups are two key components for this. However, both terms are often misused or misunderstood in the business world. Many either mistake backup for disaster recovery, or believe that they can have one without the other and remain protected should the unexpected occur.

Read more

A round up of our top blogs from 2020.

Can you believe its nearly 2021? What a year it has been! I’m sure we can all agree it has been one like no other. Throughout this time, we still been able to cover a host of topics in the entrust IT Group blog – from cyber security insights to tips for working remotely amid the pandemic and much more.

Read more

10 Unnerving Facts About Cybercrime During The Covid-19 Pandemic

2020 has had no shortage of difficult headlines. The pandemic has touched our lives in unprecedented ways. It has put health at risk, business at risk, social lives on hold. The pandemic has also emboldened cyber criminals. Many are using the Covid-19 crisis to profit from malware and social engineering attacks.

Read more

How to formulate a disaster recovery plan

What do you think of when you hear the word ‘disaster’? Perhaps it is an earthquake, or a wildfire, or maybe a global pandemic. Have you considered the word disaster in the context of your business? Every year, thousands of businesses face disasters in the form of cyber-attacks or hardware failure. These disasters can disrupt day-to-day business or, in some cases, can put a company out of business entirely.

Read more
registration

Multi Factor Authentication: What it is, why you need it & how to use it.

These days, passwords are no longer being viewed as the most secure way to protect an account. Cyber criminals are advancing at an exponential rate as are the ways in which they can find out your credentials. By only using a password as an authentication method, the security of an account is based solely on the strength of a password, which, as years of research has proven, is not generally very strong – two-thirds of people use the same password everywhere, and many of the passwords they use are easily guessed.

Read more

Remote Desktop Service vs VPN: What is best for your business?

Since the start of the Coronavirus pandemic, we have seen a huge move towards the use of remote access technologies such as Remote Desktop Services and VPNs. The move came as many organisations were being urged to have their employees work from home in order to prevent the spread of Coronavirus – according to research, RDS use is up by 41% and enterprise VPN use is up by 33%.

Read more

The end of Privacy Shield: What does it mean?

On July 16th, The European Court of Justice (ECJ) officially declared that the EU-US Privacy Shield, a key data sharing mechanism, is invalid as they believe it fails to protect people’s rights to privacy and data protection. The historic decision will have substantial consequences and be a major headache for thousands of organisations that already exchange data with the US.

Read more

5 ways to secure remote working

2020 has been a turbulent year. The COVID-19 pandemic has caused major disruption to the global economy and has changed the way we all live our lives. However, as cases fall throughout the UK, we are seeing a gradual return to the workplace for many. Indeed, Government advice on home working changes from August 1st, and employees will now be actively encouraged to return to their place of work. That being said, the example of Leicester and the recent rise in cases in Spain, serves as a reminder that we will be living with this virus for many months to come, and localised lockdowns can come very suddenly.

Read more

How to conduct an IT audit in-house [+Free Template]

The word ‘audit’ is often enough to strike fear into even the most resolute business owners. What issues will an audit raise? Will I have to fix them right away? What if it is bad news?

Read more

5 cyber security trends to look out for in 2020

2019 was an interesting (and eventful!) year for cyber security. Breaches were hitting the headlines almost every week. According to research, the number of data breaches increased by 54% in the first half of 2019, with nearly 4,000 publicly disclosed breaches during that time.

Read more

Subscribe Here!

Recent Posts

Posts by Tag

See all