Blog

Here is the IDSA Blog.  We will share some ideas of current interest in IT. Hopefully we will help you stay informed and maybe even entertained.

Are you protected against the financial cost of Cyberattacks ?

File Encrypted
Malicious hackers are increasingly attacking and threatening all types of businesses, especially cities, hospitals and schools. According to Malwarebytes, over the past year, ransomware detection has increased by 363%. No more access to private data, e-mails, telephones, management, delivery and payement systems... These ransomwares take the companies' computer systems hostage and only free them for a ransom payment. In an interview for the New York Times in August, Eli Sugarman, who directs the Hewlett Foundation’s cybersecurity program, said: “We are seeing more ransomware attacks because they work.”
Read more ...

5 Critical Actions for Securing Microsoft Office 365

Is your Office 365 securely configured ?

Microsoft Azure Security

Security experts including Microsoft and the US Cybersecurity and Infrastructure Security Agency (CISA) are warning organizations who have migrated their email services to Office 365 to check their configuration and apply five critical configuration changes to reduce potential security risks such as identity theft or other digital fraud.

ID Integrated Data SA strongly encourages organizations to implement a secure cloud strategy to protect their infrastructure assets through defending against attacks related to their O365 transition, and securing their O365 service. Specifically, CISA and Microsoft recommends that IT administrators implement the following mitigations and best practices to secure your Microsoft hosted data including Exchange Online, Sharepoint Online, Teams, and OneDrive.
Add a comment
Read more ...

Do I really need to Backup Microsoft Office 365 ? (Hint : Yes ! )

Cloud Question
Businesses are turning to the cloud to allow workers to collaborate more efficiently, be more productive and work from anywhere and any device.  Microsoft Office 365 facilitates the modern workplace environment and helps lower the cost of IT infrastructure and services.  At the same time, it is important for organizations adopting Microsoft as a service to fully understand the need for adding a third party backup solution to protect your organization’s data.

Here are 5 reasons that third-party backup is a must for all Microsoft Cloud data including Exchange Online, Sharepoint Online, Teams, and OneDrive.
Read more ...

GDPR applies to Swiss Enterprises too !

Gdpr General Data Protection 213892279
With the European Union’s General Data Protection Regulation (GDPR) compliance deadline of May 25, 2018, you’ve only got a few months to decide what, exactly, GDPR means for your company, your customers, and your employees.

Compliance with new data protection regulations is crucial to avoid legal liability, protect your brand, and preserve customer and employee confidence. Those who fail to meet compliance guidelines face heavy financial penalties.
GDPR doesn’t just affect European companies. Any business collecting and handling the personal data of EU citizens must comply even if they’re based outside the EU. As such, these changes bring new liabilities for the vast majority of businesses around the world.

If you meet any of the following criteria, GDPR affects you:

Add a comment
Read more ...

Be a Hero with Certified Ethical Hacker Video Training (CEH)

“To beat a hacker, you need to think like a hacker”. - Anonymous

CEH Hero

Be ready to spring into action before hackers strike.  Certified Ethical Hacker training is the gold standard for practical hands-on security training.

Learn at your own speed with this video training. This course will immerse you into the Hacker Mindset so that you will be able to defend your IT systems against future attacks. The security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment.

This ethical hacking course puts you in the driver’s seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! You will scan, test, hack and secure your own systems.

The online- video training kit includes the following topics, labs as well as a Certified Ethical Hacker exam token:

Add a comment
Read more ...

5 Important Reasons you need to protect your Enterprise against data loss

data protection
Today, your enterprise or organization probably has a plan for protecting your data from hackers and outside intruders, but that isn’t enough anymore. Most organizations have confidential information that they would like to keep safe from prying eyes.

Organizations need to identify and protect this sensitive information and prevent its accidental disclosure. They may also need to prove compliance to auditors.

You may need a DLP “data loss prevention” solution and here are 5 important reasons why :

Add a comment
Read more ...

Good reasons to backup your company's data to a Swiss "Cloud"

swisscloud
Did you ever wonder: What if my office building burns or my servers are destroyed ? or What if my business’s data is lost or stolen? Can my business recover from a complete loss of my computer data?

A single incident can cost a lot in lost time and money and lost business
Sad but true. An IT disaster can happen to an enterprise of any size. Picture the scene: a water leak at your neighbor’s place and yours is flooded. Your IT servers and the electrical devices on your network are irretrievably damaged. Suddenly you have lost all the data that you stored on your file server and you didn’t backup to the Cloud. Or even worse, you mistakenly opened a suspicious email attachment and all your data has become unreadable because it is encrypted by ransomware.

Add a comment
Read more ...

Wannacry ? Can we protect ourselves from Ransomware ?

Wannacry ? Can we protect ourselves from Ransomware ?
In the movie "Minority Report," the police use "predictive vision" to stop criminals before they act on their bad intentions. Effective IT security now requires the same approach. Today's sophisticated attacks systematically can get around point solution technologies such as firewalls and anti-virus/malware detection. It is essential that we adopt new measures that predictively neutralize these new threats.

Although we aren’t yet able to identify and apprehend cybercriminals by their evil intentions before they launch their attacks, we do have some tools that allow us to detect and prevent ransomware propagation before it exposes our organizations to important or even catastrophic losses in terms of time and money.

Some of these tools go a long way towards preventing previously unknown attacks....

Add a comment
Read more ...

Can Mac and Office 365 Live Happily Ever After Together ?

OFC16 Owen Cheryl 011 4
Once upon a time, documents produced by an Office suite for PC were not usable by people using Mac OS systems. This was mostly the result of the fact that macros did not exist for the Mac and tabs could throw the entire page setup for a loop. Thanks to Office 365, documents are now compatible on both systems, on the Office 2016 suite installed locally as well as on-line.

Do Microsoft Office products perform well on Apple OS/IOS in 2017 ?

Add a comment
Read more ...
Page 1 of 2

Sign Up To Our Newsletter