Cloud Backup
 

We`re just sending through your details

Please give us a few moments whilst we get your account ready.

OKAY

1 in 5 children have experiencing bullying online

1 in 5 children have experiencing bullying online

posted in Cyber-SecurityCyber-Security ● 17 Jul 2015

A recent report by the NSPCC showed that 1 in 5 children have been bullied online. The sort of bullying experienced ranged from cyber stalking to unwanted sexual attention. However only 1 in 10 victims feel confident to report the bullying to a trusted parent or adult.This demonstrates a worrying landscape for children today. One of the perturbing features of online bullying is that it is difficult for an adult to detect, and stop the behavior. Redstor’s E-Safety application can monitor behavior on a device within an organisation.   E-Safety will alert staff to swearing, hurtful comments, online bullying, harmful or worrying websites and other safeguarding concerns, allowing the staff to demonstrate a proactive duty of care.The intelligent device can alert the e-safety adviser based on selected key words and phrases, even if the message is not actually delivered. Therefore if a child is typing out harmful messages to another, but not sending them,a proactive effort can still be taken to stop the bullying. In addition, e-safety can also look after a vulnerable child. For instance, if the child is searching for ways to harm themselves online, the use of selected words will trigger an alert to the e-safety adviser to allow them to help the child.Please visit our E-Safety page to find out more: https://redstor.com/esafety.html, or download the E-safety data sheet: https://redstor.com/downloads/Redstor_E-Safety_Datasheet.pdf.

How third-party backup for OneNote and Class Notebooks avoids falling into non-compliance trap

If you use OneNote and Class Notebooks regularly, the prospect of waking up one day and finding that your notes have gone, is the stuff of nightmares.

Continue reading

5 ways to add real value to customers’ digital transformation initiatives by providing Kubernetes backup

Here we outline the five key elements CSPs and Azure consultancies need from a Kubernetes backup solution to add real value to customers’ digital transformation initiatives.

Continue reading

Microsoft 365 Security – An overview of best practices

The rise in home working, increase in laptops and wide-scale adoption of OneDrive, SharePoint , and OneNote has only served to intensify issues around data security and access.

Continue reading