TCT News

Serious Benefits of an IT Support Service Agreement

A support Service Agreements is an important part of providing or receiving an IT support service. Successful support agreements are founded on a clear comprehension of what the business wants from the IT support service and how the IT Company can provide it. It relies on account managers discussing outcomes...
Read more

Types of Cyber Attacks

Cyber-attacks affect companies all over the world. Some attacks are relatively indiscriminate, such as the WannaCry ransomware attacks that swept the globe. Others are highly targeted acts of theft or espionage. But all cyber-attacks are a potential threat to the operations, reputation, and integrity of organisations. It is how you...
Read more

5 Things to Consider before going to the Cloud

The cloud can mean different things to different people, however, it essentially relates to your information being stored on someone else’s server, at a location you cannot gain physical access to. For instance Google has cloud storage in more than eight data centre locations in the US, 1 in South...
Read more

Growth of Ransomware Threats

Over the last few years we have seen a huge growth of ransomware threats, the severity of which has been felt worldwide, by big business (as reported many times in the news), government departments and hospitals; and by small businesses every day. The types of attacks have grown, changed and...
Read more

How are you Securing your Mobile Devices

Getting mobile security under control can be challenging, but it is now a necessary component to keep your network secure from Cyber Criminals. Smartphones with access to company emails, services, or data are vulnerable to data breaches. In 2016, smartphone malware attacks surged by almost 400%. F-Secure Threat Labs have...
Read more

Cyber 360 – Our Answer to the Threat Landscape

The cyber threat landscape has evolved significantly from the early days when it used to be mostly about kids writing viruses for fun. Today, cyber-crime is an attractive business with huge financial opportunities. There are two ways hackers can get into your company’s network — vulnerable technology or you. Well,...
Read more

World Backup Day – 31 March

This year, World Backup Day falls on a Saturday.  So we are getting in early to remind everyone to check your backup and DR strategies. The average total cost of a data breach for Australian organisations in 2017 was $2.51 million. Data is more valuable than ever before. Particularly with...
Read more

Losing Data in the Cloud

Losing data is never fun. Whether it be one document or ten. In traditional terms, we all have a backup system for servers, PCs and items on the network. But what about the cloud data. How do you protect all that data that is sitting in the O365 cloud? There’s...
Read more

Ransomware Evolution

A new form of ransomware has managed to avoid detection by built-in security in Google Drive and Microsoft Office 365. There is now Ransomware-as-a-service model that allows cyber criminals access to ransomware templates to launch attacks. The malware provider then takes a percentage of the dollar reward. These ransomware templates...
Read more

SonicWall Invents Real-Time Deep Memory Inspection Technology

SonicWall reveals that a new Capture Cloud engine has discovered hundreds of new malware variants not seen before by sandboxing technology. Through the use of previously unannounced patent-pending technology, SonicWall Capture Labs security researchers engineered an advanced method for identifying and mitigating threats through deep memory inspection — all in...
Read more