We`re just sending through your details

Please give us a few moments whilst we get your account ready.

OKAY

Reading College IT equipment stolen

Reading College IT equipment stolen

posted in Cyber-Security ● 24 Sep 2012

Thousands of pounds worth of ICT equipment was stolen from Reading College on the evening of September 12th just hours after it had been delivered.Items stolen included iMacs, MacBooks, laptops, computers and memory sticks. Thankfully, as the ICT equipment was new, it’s unlikely there was any private or confidential data on it when it was stolen.In the vast majority of cases, loss of information is far more costly than the loss of equipment itself. In addition to loss of business and reputation, organisations such as the Information Commissioners Office (ICO) have the power to impose hefty fines (up to the value of £500,000.00) in the event of data loss or theft where private individuals’ information is compromised. This includes, for example, the theft of backup tapes stored in a fire-safe onsite.Redstor’s online backup service ensures data is safely and automatically backed up offsite in an encrypted format. In so doing, it helps ensure organisations are protecting themselves against data loss. It also removes the reliance on tapes which helps reduce the risk of losing data whilst it’s being transported off-site unencrypted.
Vital new role of AI in keeping backup data safe from malware

Vital new role of AI in keeping backup data safe from malware

Every day more than 350,000 new types of malware are unleashed on the internet. The scale of the problem is so massive, it is no longer enough to have traditional anti-virus software, solely defending against known threats.

Continue reading
Xero Data Backup

Why you should consider Xero Data Backup for your accountancy firm

Ignoring the need for a third-party backup is a major gamble. Xero’s own Services Agreement states: “You must maintain copies of all data inputted into the service. Xero expressly excludes liability for any loss of data no matter how caused.”
Continue reading

Survey on risk of data loss and cybercrime

Wondering how best to fend off new cyber threats? Curious about what your peers are doing?

Continue reading