Latest Blog.
Don’t Forget the Basics of Network Security (Part 1)
|It seems every week you read a story about unsecured databases being exposed on the Internet, information being held for ransom, or even children’s teddy bears being attacked without their owner’s knowledge. While ...
Hybrid Infrastructure Is the Future of Hosting (According to Gartner)
|Gartner, Inc. just released an industry report stating that within three years, 90% of organisations will adopt hybrid infrastructure management. “As the demand for agility and flexibility grows, organisations will shift toward more industrialised,...
Why you Should Invest in Backup & Disaster Recovery Plan?
|The short answer is yes. If your business has an online component (pro tip: it should), then your business is vulnerable to bugs, hackers, hardware failures, natural disasters, interruptions to business continuity (and therefore lost revenues), and s...
Macquarie Cloud Services to power Dell’s push into Australian Cloud
|Macquarie Technology Group’s cloud business unit has secured Virtustream, a Dell Technologies company, as a significant new customer. “We are delighted to provide local infrastructure for the Dell cloud to be delivered in-country, across multiple...
Business Continuity VS Disaster Recovery
|Do you know how much an hour of downtime costs your business? Most business owners don’t. Studies show that for small to mid-sized businesses, an hour of downtime averages around $12,500 per hour. Now, for most non-IT gurus, 99.99% uptime sounds li...
For when things really go south: multi-failure disaster recovery.
|Disasters aren’t polite. They don’t schedule themselves ahead of time. And disasters rarely occur in a tidy way. They can take out multiple systems and backups when they strike. You can’t schedule a disaster, but you can plan for it. And any mu...
Researchers create first practical attack on SHA-1
|TL;DR Researchers create first practical attack on SHA-1. If you use SHA-1, start moving to SHA-256/SHA-3. What is SHA-1? The Secure Hash Algorithm 1 (SHA-1) was created by the NSA and first published in 1995 as an improvement on the previously popu...
From cost to value: The true worth of cloud hosting
|Cloud hosting is the buzzword of the day in the tech world. While cloud hosting value – like reliability, flexibility, and scalability – is easy to see, what’s not so easy to see is the price of cloud hosting. In fact, to some businesses, esti...
Everything you need to know about hosting and cloud computing
|Cloud computing has allowed many businesses to profit from its flexibility, power, and its relatively low cost of entry. It has been used by companies to outsource some or all of their IT applications and infrastructure since as early as the 1990’...
Cloud Security Myth Busters Edition : Is Data Stored in the Cloud Safe?
|The short answer is there is no such things as perfectly, safe, 100% secured data. Data stored in-house is vulnerable to physical harm like fire or tampering from disgruntled employees. Data stored in a cloud, while protected from physical destructio...