Disaster Recovery Plan

Your business can be seriously impacted if your networks and IT infrastructure go offline unexpectedly. Whether you are running a small start-up or an enterprise, a crises do happen, and should be expected.

However, if you are prepared for IT outages, you can restore business operations quickly. A disaster recovery plan is, therefore, essential to minimise losses in the face of a breakdown.

(more…)

Can Employers Require Employees to Wear Face Masks? | Workest

It is safe to say that the novel Coronavirus has upended our lifestyle. From major loss of lives to market crashes, numerous facets of our lives have been changed as a result of Covid-19.

We know that numerous businesses and sectors have had to undergo a shift from offline to online environments as people work from home. On our network alone, we’ve seen a spike of almost 500 percent in video conferencing and video streaming traffic from our dedicated servers. So how has internet usage changed amidst the new normal? We take a look below. (more…)

The Psychology Behind DDoS: Motivations and Methods

Last year, we saw an 84% increase in the Distributed Denial of Service (DDoS) attacks as early as the first quarter, and businesses are bracing for attacks to continue in 2020. DDoS attacks have brought considerable losses  even for large technology companies like Netflix and PayPal, bringing down their websites and restricting their ability to trade.  One DDoS attack even brought down internet connectivity of the whole East Coast in the US several years ago. In this article, we provide a snapshot of DDoS attack trends last year, discuss the types of attacks that are prevalent in 2020, and discuss projections for the years to come.

(more…)

According to a report global research firm IDC, 40% of business data will be saved, processed, served from the edge by 2021. Edge computing uses technology to improve application and download speeds for users by moving data geographically closer to their location. In this article, we discuss the advantages of edge computing and how it works.

(more…)

Considering the prevalence of cloud computing among businesses today, many held the belief that dedicated or baremetal servers will soon lose favour as an IT solution. Not only has this proven to be incorrect, but there has in fact been a growth in dedicated server use worldwide. In this article, we discuss the reasons why. (more…)

Ransomware Protection | Vade Secure

Ransomware attacks remains a significant cybersecurity threat for consumers and businesses in Australia and around the world. In the Annual State of Malware Report published by Malwarebytes, they described a 90% increase in ransomware detection over the past year. Malware developers continue to tweak and release better versions of ransomware to make them more difficult to detect and mitigate.  In this article, we outline key trends and prevention strategies for modern ransomware attacks.

(more…)

man looking at colocation data centre

If you are in the market for colocation, you will have seen advertisements for datacentres all around the country, or even internationally. Colocation, in essence, is making arrangements to house your hardware, software and data to a 3rd party datacentre. As you may already know, the expense of maintaining an IT infrastructure is significant and comes with many responsibilities such as security, climate control and maintenance. So where should your colocation datacentre be located?

(more…)

When researching server hosting options for your business, you have likely found two key services:

  • Colocation – you supply and manage your server hardware which is installed in a datacentre. You pay for datacentre space, power and data, and usually incur high capital expenditure due to the upfront investment in hardware.
  • Baremetal servers – you lease hardware as well as datacentre space, power and data from a service provider. The hardware is managed for you and as it is leased to you, no upfront capital investment is required.

These services are very different, but in a bid to move towards digital transformation it can be difficult for SMEs to determine which approach is best suited for their business. Successful business leaders make decisions based on what will benefit their organisation over the medium and long term. It would not be wise to invest a significant amount of resources on something that does not yield a favourable return on investment, and the same applies to your business’ colocation strategy. 

But as the old saying goes, you can never improve on something that you are not measuring. In this article, we clarify the essential questions that decisionmakers should ask themselves when determining ROI (return on investment) for colocation, and whether a leased dedicated server is more appropriate.

(more…)

When businesses come to us looking to upgrade their IT systems, a key question tends to be whether they should purchase their own hardware and colocate it in a datacentre, or lease their infrastructure as a service. There’s no straightforward answer to this, unfortunately; it depends on the type of hardware you need, and the resources your organisation has to manage infrastructure.

In this post, we examine the different use cases for colocation and infrastructure-as-a-service.  (more…)

DDoS (Distributed Denial of Service) attacks can be described as one of the most prevalent and dangerous cybersecurity threats impacting businesses today. According to a report published by Arbor Networks ATLAS, there have been at least 610,000 cases of DDoS attacks affecting markets around the world from July 2017 to December 2017 (6 month period).

report published by Arbor Networks ATLAS

The cost of every one the above-mentioned DDoS attacks can be devastating. A risk assessment report published by Kaspersky Labs estimates that the average cost of a DDoS attack on small businesses is $106,000 and over $1.6 million for a large enterprise.

Considering the prevalence and potential damages cited above, it is clear that DDoS attacks are increasingly becoming a threat. This article provides an overview of how attacks work, and steps businesses can take to mitigate the risk.  (more…)