SlideShare a Scribd company logo
1 of 5
Download to read offline
ITProPortal is supported by its audience. When you purchase through links on our site, we may earn an a liate commission. Learn more
(Image credit: Future)
    
How to secure your enterprise data during Covid-19
By Chris Henderson 4 hours ago
Top ways businesses can protect employees while ensuring the security and future of their organisation.
As COVID-19 continues to spread, millions of people around the world are forced to work remotely. Yet, simultaneously there is
increasing evidence to show that malicious threat actors are using concerns of the virus to prey on those same individuals. Given this,
it is more important than ever that organisations implement the necessary technology to backup their data in the event of downtime
or should an employee fall victim to a ransomware attack.
While ensuring remote workers are fully backed up is more critical today than prior to the prevalence of the virus, the good news is
that the process to back up enterprise data isn’t much di erent than it was during normal business operations. It all comes down to
risk mitigation.
In today’s climate, work machines are being used as personal machines and personal machines as work machines, further blurring
the lines of security and increasing the chance of a worker falling victim to a phishing scam. As millions of people work from home,
these assets are much more likely to fall victim to a power surge and other disasters not normally present in an o ce. If sensitive
data isn’t backed up, it can be lost for good. Typically, home o ces don’t have onsite IT sta , which means if an individual su ers
We'd like to send you notifications for the latest
news and updates.
ALLOWNO THANKS
from a phishing scam, ransomware attack, or loses power, and consequently loses data, while remote, the total recovery time
increases signi cantly.
Keeping all this in mind, here are the top points businesses should consider in order to protect employees while ensuring the security
and future of their organisation.
Coronavirus-related phishing email attacks up 600 percent
Consider key backup technologies
At the corporate IT level, all backup strategies should remain in place. This means that network adjacent backups should be up and
running, requiring organisations to take a proactive approach to periodically check all devices to ensure that they are working
properly. Additionally, now that almost all teams are working remotely, there are three speci c types of backups employers should
consider.
 
File level and endpoint backups: The rst type of backup, and most secure, involves organisations  ranking their critical functions, this
includes full backups for remote workers. Enterprise-level File Sync and Share technologies support the backup of local les in a
designated folder. These types of backups may also include remote disk level protection enabling quick restoration to a new machine
if needed. This makes these backup technologies the most frequently used and the most secure choice.
SaaS provided backups: Second, there are many SaaS o erings that include backups of data in the form of versioning, including
Google Apps and O ce 365. These tools rely on the user to stay within the provided IT environment and are undermined heavily by
shadow IT.
Local backups: Local backups are the third option to consider, and traditionally the least secure. This is because they are only as
strong as the home network, which is inherently vulnerable to attacks and disaster. The same event that may require a backup will
likely impact any local protection.
Securing endpoints is no longer just installing antivirus, rather it encompasses managing the hygiene of all endpoints, including
con guration and patching. Ensure you have a remote monitoring and management tool (RMM), which enables organisations to
monitor the status of new assets entering an environment remotely and issue patches where necessary. By implementing an RMM
technology solution, organisations can rest assured that in the event an employee does fall victim to a cyberattack while working
remotely, the organisation has the proper tools in place to review and manage the situation and prevent the attack from escalating.
Finally, while local backups are a convenient option, they should be avoided because they are not as secure as le level or even SaaS
provided backups. When dealing with backup providers, it’s also critical to con rm whether the backup provider has geographical
redundancy. Geographical redundancy empowers businesses to anticipate which remote workers could be impacted, which may lead
to longer response times to data centre outages. Geographically separating your critical backups will help ensure that should an
outage occur within the infrastructure of your backup provider, it will not result in an outage for your clients.  
Identify who collects and organises backups across a distributed user environment
Managed services providers (MSPs) are responsible for ensuring their customers have the necessary tools and resources to remain
up and running. Many business requirements are changing as sta move to remote work and businesses augment to operate during
these times. MSPs should connect with their customers to better understand their needs in this new remote environment to ensure
their backups are happening regularly and securely.
Avoid assuming that backups are immune from a cyberattack. Speci cally, while COVID-19 cases continue to grow in the United States
and more individuals remain in quarantine, state sponsored attackers in other regions around the world are becoming more
prevalent. Delaying an organisation’s backup security audit is a mistake that could lead to a successful ransomware attack and
ultimately jeopardise the fate of the company.
Coronavirus could 'expose limitations of the cloud'
Look ahead to brighter days
As we look towards the future when we can return to normal routines, it’s important to manage expectations around full immediate
ramp-up. For example, businesses should proceed with caution before rapidly shipping out assets to support remote work. It is
We'd like to send you notifications for the latest
news and updates.
ALLOWNO THANKS
 GET WEEKLY NEWS AND
ANALYSIS
Sign up below to get the latest from
ITProPortal, plus exclusive special
o ers, direct to your inbox!
No spam, we promise. You can unsubscribe at any time and
we'll never share your details without your permission.
MOST READ MOST SHARED
YourEmailAddress
SIGN M
ENTERPRISE DATA COVID-19 CORONAVIRUS
TOPICS
critical to keep track of the inventory being sent out, and the machines that have access to your critical data. Make sure your IT and
security teams are equipped to monitor any potentially privileged machines sent out to provide the proper care required and reduce
the risk of a successful cyberattack. Finally, once normal work routines resume, place extra care to collect any privileged machines
which are no longer needed.
Keep in mind, there is a light at the end of the tunnel and we are all in this together. Taking the extra time to develop a proactive plan
with the proper technology, that keeps the business, MSP, and employees in mind, will put the organisation as a whole in a better
place for when we can all return to life as normal.
New coronavirus malware 'trashes' Windows PCs
Chris Henderson, Director, Information Security, Datto
Get updates from all sorts of things that matter to you
SUBSCRIBE TO PUSH NOTIFICATIONS
Datemyage.com | Sponsored
StrategyCombat | Sponsored
Where do mature singles meet in Marikina?
Play this Game for 1 Minute and see why everyone is addicted
ITProPortal
Less than half of businesses provide cybersecurity training
Training is critical to ensuring staff don't become insider threats.
Work From Home | Search Ads | Sponsored
Work From Home Jobs in the USA May Pay More Than You Think
We'd like to send you notifications for the latest
news and updates.
ALLOWNO THANKS
MOST READ MOST SHARED
2 How to turn o "OK Google" Android voice search
3 How to insert a tick or a cross symbol in Microsoft Word and Excel
4 How to set a background picture on your Android or iOS smartphone
5 How to start page numbering from a speci c page in Microsoft Word
ITProPortal is part of Future plc, an international media group and leading digital publisher. Visit our corporate site.
© Future Publishing Limited Quay House, The Ambury, Bath BA1 1UA. All rights reserved. England and Wales company registration number
2008885.
1 South Korea is the rst country to launch 5G
About us
Terms and conditions
Privacy policy
Cookies policy
Advertise with us
We'd like to send you notifications for the latest
news and updates.
ALLOWNO THANKS
How to secure your enterprise data during Covid-19

More Related Content

What's hot

Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...Puneet Kukreja
 
VIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareVIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareGFI Software
 
Ass3201 cyber securityassignment
Ass3201 cyber securityassignmentAss3201 cyber securityassignment
Ass3201 cyber securityassignmentharinathinfotech
 
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...GFI Software
 
Justifying IT Security: Managing Risk
Justifying IT Security: Managing Risk Justifying IT Security: Managing Risk
Justifying IT Security: Managing Risk judythornell
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...Rishi Singh
 
Is your infrastructure holding you back?
Is your infrastructure holding you back?Is your infrastructure holding you back?
Is your infrastructure holding you back?Gabe Akisanmi
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilienceSymantec
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...IBM Security
 
BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0Julian Samuels
 
BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0Julian Samuels
 
Should we fear the cloud?
Should we fear the cloud?Should we fear the cloud?
Should we fear the cloud?Gabe Akisanmi
 
security_secure_pipes_frost_whitepaper
security_secure_pipes_frost_whitepapersecurity_secure_pipes_frost_whitepaper
security_secure_pipes_frost_whitepaperAlan Rudd
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksEmmanuel Oshogwe Akpeokhai
 

What's hot (20)

Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
 
Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417
 
VIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareVIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of Bloatware
 
6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins
 
Ass3201 cyber securityassignment
Ass3201 cyber securityassignmentAss3201 cyber securityassignment
Ass3201 cyber securityassignment
 
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
 
Hybrid Technology
Hybrid TechnologyHybrid Technology
Hybrid Technology
 
Justifying IT Security: Managing Risk
Justifying IT Security: Managing Risk Justifying IT Security: Managing Risk
Justifying IT Security: Managing Risk
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
Is your infrastructure holding you back?
Is your infrastructure holding you back?Is your infrastructure holding you back?
Is your infrastructure holding you back?
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilience
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Avoiding The Seven Deadly Sins of IT
Avoiding The Seven Deadly Sins of ITAvoiding The Seven Deadly Sins of IT
Avoiding The Seven Deadly Sins of IT
 
BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0
 
BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0
 
Should we fear the cloud?
Should we fear the cloud?Should we fear the cloud?
Should we fear the cloud?
 
security_secure_pipes_frost_whitepaper
security_secure_pipes_frost_whitepapersecurity_secure_pipes_frost_whitepaper
security_secure_pipes_frost_whitepaper
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External Attacks
 
Research Paper
Research PaperResearch Paper
Research Paper
 

Similar to How to secure your enterprise data during Covid-19

Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfInfinityGroup5
 
Enhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfEnhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfTuring.com
 
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdfFour Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdfEnterprise Insider
 
Managed Services: Turning Pandemic Into Profitable Protection
Managed Services: Turning Pandemic Into Profitable ProtectionManaged Services: Turning Pandemic Into Profitable Protection
Managed Services: Turning Pandemic Into Profitable ProtectionThe TNS Group
 
Securing Your Work from Home.pdf
Securing Your Work from Home.pdfSecuring Your Work from Home.pdf
Securing Your Work from Home.pdfKavitaDubey18
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesIcomm Technologies
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
 
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdfNCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdfPolicypros.co.uk
 
Implementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdf
Implementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdfImplementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdf
Implementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdfBahaa Abdul Hussein
 
Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?SOCVault
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudNordic Backup
 
The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowDharmendra Rama
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?TechSoup
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Cyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptxCyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptxAhad
 
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdfThe Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdfAhad
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowShantam Goel
 
Security and the cloud
Security and the cloudSecurity and the cloud
Security and the cloudFREVVO
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessGreg Wartes, MCP
 

Similar to How to secure your enterprise data during Covid-19 (20)

Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
Enhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfEnhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdf
 
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdfFour Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
 
The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?
 
Managed Services: Turning Pandemic Into Profitable Protection
Managed Services: Turning Pandemic Into Profitable ProtectionManaged Services: Turning Pandemic Into Profitable Protection
Managed Services: Turning Pandemic Into Profitable Protection
 
Securing Your Work from Home.pdf
Securing Your Work from Home.pdfSecuring Your Work from Home.pdf
Securing Your Work from Home.pdf
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdfNCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
 
Implementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdf
Implementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdfImplementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdf
Implementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdf
 
Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
 
The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdow
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Cyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptxCyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptx
 
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdfThe Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To Know
 
Security and the cloud
Security and the cloudSecurity and the cloud
Security and the cloud
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
 

More from Dharmendra Rama

Adding Incident Response Containers To The Cyber Security Tool Belt
Adding Incident Response Containers To The Cyber Security Tool BeltAdding Incident Response Containers To The Cyber Security Tool Belt
Adding Incident Response Containers To The Cyber Security Tool BeltDharmendra Rama
 
CORSAIR VENGEANCE A4100 GAMING PC REVIEW
CORSAIR VENGEANCE A4100 GAMING PC REVIEWCORSAIR VENGEANCE A4100 GAMING PC REVIEW
CORSAIR VENGEANCE A4100 GAMING PC REVIEWDharmendra Rama
 
MINI “GAMING PC” NAILS THE LOOK, STREAMS THE GAMES
MINI “GAMING PC” NAILS THE LOOK, STREAMS THE GAMESMINI “GAMING PC” NAILS THE LOOK, STREAMS THE GAMES
MINI “GAMING PC” NAILS THE LOOK, STREAMS THE GAMESDharmendra Rama
 
How to build a gaming PC — and why you should
How to build a gaming PC — and why you shouldHow to build a gaming PC — and why you should
How to build a gaming PC — and why you shouldDharmendra Rama
 
How to Build a Gaming PC for Under $1200
How to Build a Gaming PC for Under $1200How to Build a Gaming PC for Under $1200
How to Build a Gaming PC for Under $1200Dharmendra Rama
 
How I accidentally built a tech startup — without any technological knowledge
How I accidentally built a tech startup — without any technological knowledgeHow I accidentally built a tech startup — without any technological knowledge
How I accidentally built a tech startup — without any technological knowledgeDharmendra Rama
 
Computer engineering: A deeper perspective
Computer engineering: A deeper perspectiveComputer engineering: A deeper perspective
Computer engineering: A deeper perspectiveDharmendra Rama
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?Dharmendra Rama
 
With pandemic-era acquisitions,big tech is back in the anti trust crosshairs
With pandemic-era acquisitions,big tech is back in the anti trust crosshairsWith pandemic-era acquisitions,big tech is back in the anti trust crosshairs
With pandemic-era acquisitions,big tech is back in the anti trust crosshairsDharmendra Rama
 
Apple, Google rework coronavirus tracking tech to address privacy concerns
Apple, Google rework coronavirus tracking tech to address privacy concernsApple, Google rework coronavirus tracking tech to address privacy concerns
Apple, Google rework coronavirus tracking tech to address privacy concernsDharmendra Rama
 
Big Tech, Privacy, and Power
Big Tech, Privacy, and Power Big Tech, Privacy, and Power
Big Tech, Privacy, and Power Dharmendra Rama
 
21 tech gadgets we use to boost our productivity and comfort when we work fro...
21 tech gadgets we use to boost our productivity and comfort when we work fro...21 tech gadgets we use to boost our productivity and comfort when we work fro...
21 tech gadgets we use to boost our productivity and comfort when we work fro...Dharmendra Rama
 
Android for beginners: Tips and tricks for your new smartphone
Android for beginners: Tips and tricks for your new smartphoneAndroid for beginners: Tips and tricks for your new smartphone
Android for beginners: Tips and tricks for your new smartphoneDharmendra Rama
 
13 Smart Ways To Measure Your Tech Team's Productivity
13 Smart Ways To Measure Your Tech Team's Productivity13 Smart Ways To Measure Your Tech Team's Productivity
13 Smart Ways To Measure Your Tech Team's ProductivityDharmendra Rama
 
Computer Engineering 101: Stripping computers to their two most basic parts
Computer Engineering 101: Stripping computers to their two most basic partsComputer Engineering 101: Stripping computers to their two most basic parts
Computer Engineering 101: Stripping computers to their two most basic partsDharmendra Rama
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020Dharmendra Rama
 
Computer Engineering 101: Stripping computers to their two most basic parts
Computer Engineering 101: Stripping computers to their two most basic partsComputer Engineering 101: Stripping computers to their two most basic parts
Computer Engineering 101: Stripping computers to their two most basic partsDharmendra Rama
 

More from Dharmendra Rama (20)

Adding Incident Response Containers To The Cyber Security Tool Belt
Adding Incident Response Containers To The Cyber Security Tool BeltAdding Incident Response Containers To The Cyber Security Tool Belt
Adding Incident Response Containers To The Cyber Security Tool Belt
 
CORSAIR VENGEANCE A4100 GAMING PC REVIEW
CORSAIR VENGEANCE A4100 GAMING PC REVIEWCORSAIR VENGEANCE A4100 GAMING PC REVIEW
CORSAIR VENGEANCE A4100 GAMING PC REVIEW
 
MINI “GAMING PC” NAILS THE LOOK, STREAMS THE GAMES
MINI “GAMING PC” NAILS THE LOOK, STREAMS THE GAMESMINI “GAMING PC” NAILS THE LOOK, STREAMS THE GAMES
MINI “GAMING PC” NAILS THE LOOK, STREAMS THE GAMES
 
How to build a gaming PC — and why you should
How to build a gaming PC — and why you shouldHow to build a gaming PC — and why you should
How to build a gaming PC — and why you should
 
How to Build a Gaming PC for Under $1200
How to Build a Gaming PC for Under $1200How to Build a Gaming PC for Under $1200
How to Build a Gaming PC for Under $1200
 
Cyber attack hits Lion
Cyber attack hits LionCyber attack hits Lion
Cyber attack hits Lion
 
How I accidentally built a tech startup — without any technological knowledge
How I accidentally built a tech startup — without any technological knowledgeHow I accidentally built a tech startup — without any technological knowledge
How I accidentally built a tech startup — without any technological knowledge
 
Computer engineering: A deeper perspective
Computer engineering: A deeper perspectiveComputer engineering: A deeper perspective
Computer engineering: A deeper perspective
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?
 
With pandemic-era acquisitions,big tech is back in the anti trust crosshairs
With pandemic-era acquisitions,big tech is back in the anti trust crosshairsWith pandemic-era acquisitions,big tech is back in the anti trust crosshairs
With pandemic-era acquisitions,big tech is back in the anti trust crosshairs
 
Apple, Google rework coronavirus tracking tech to address privacy concerns
Apple, Google rework coronavirus tracking tech to address privacy concernsApple, Google rework coronavirus tracking tech to address privacy concerns
Apple, Google rework coronavirus tracking tech to address privacy concerns
 
Big Tech, Privacy, and Power
Big Tech, Privacy, and Power Big Tech, Privacy, and Power
Big Tech, Privacy, and Power
 
21 tech gadgets we use to boost our productivity and comfort when we work fro...
21 tech gadgets we use to boost our productivity and comfort when we work fro...21 tech gadgets we use to boost our productivity and comfort when we work fro...
21 tech gadgets we use to boost our productivity and comfort when we work fro...
 
Android for beginners: Tips and tricks for your new smartphone
Android for beginners: Tips and tricks for your new smartphoneAndroid for beginners: Tips and tricks for your new smartphone
Android for beginners: Tips and tricks for your new smartphone
 
13 Smart Ways To Measure Your Tech Team's Productivity
13 Smart Ways To Measure Your Tech Team's Productivity13 Smart Ways To Measure Your Tech Team's Productivity
13 Smart Ways To Measure Your Tech Team's Productivity
 
Computer Engineering 101: Stripping computers to their two most basic parts
Computer Engineering 101: Stripping computers to their two most basic partsComputer Engineering 101: Stripping computers to their two most basic parts
Computer Engineering 101: Stripping computers to their two most basic parts
 
Dharmendra Rama
Dharmendra RamaDharmendra Rama
Dharmendra Rama
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020
 
Computer Engineering 101: Stripping computers to their two most basic parts
Computer Engineering 101: Stripping computers to their two most basic partsComputer Engineering 101: Stripping computers to their two most basic parts
Computer Engineering 101: Stripping computers to their two most basic parts
 
Dharmendra Rama
Dharmendra RamaDharmendra Rama
Dharmendra Rama
 

Recently uploaded

9654467111 Call Girls In Noida Sector 62 Short 1500 Night 6000
9654467111 Call Girls In Noida Sector 62 Short 1500 Night 60009654467111 Call Girls In Noida Sector 62 Short 1500 Night 6000
9654467111 Call Girls In Noida Sector 62 Short 1500 Night 6000Sapana Sha
 
9654467111 Full Enjoy @24/7 Call Girls In Saket Delhi Ncr
9654467111 Full Enjoy @24/7 Call Girls In Saket Delhi Ncr9654467111 Full Enjoy @24/7 Call Girls In Saket Delhi Ncr
9654467111 Full Enjoy @24/7 Call Girls In Saket Delhi NcrSapana Sha
 
Benjamin Portfolio Process Work Slideshow
Benjamin Portfolio Process Work SlideshowBenjamin Portfolio Process Work Slideshow
Benjamin Portfolio Process Work Slideshowssuser971f6c
 
MinSheng Gaofeng Estate commercial storyboard
MinSheng Gaofeng Estate commercial storyboardMinSheng Gaofeng Estate commercial storyboard
MinSheng Gaofeng Estate commercial storyboardjessica288382
 
Govindpuri Call Girls : ☎ 8527673949, Low rate Call Girls
Govindpuri Call Girls : ☎ 8527673949, Low rate Call GirlsGovindpuri Call Girls : ☎ 8527673949, Low rate Call Girls
Govindpuri Call Girls : ☎ 8527673949, Low rate Call Girlsashishs7044
 
FULL ENJOY - 9953040155 Call Girls in Karol Bagh | Delhi
FULL ENJOY - 9953040155 Call Girls in Karol Bagh | DelhiFULL ENJOY - 9953040155 Call Girls in Karol Bagh | Delhi
FULL ENJOY - 9953040155 Call Girls in Karol Bagh | DelhiMalviyaNagarCallGirl
 
Low Rate Call Girls in Laxmi Nagar Delhi Call 9990771857
Low Rate Call Girls in Laxmi Nagar Delhi Call 9990771857Low Rate Call Girls in Laxmi Nagar Delhi Call 9990771857
Low Rate Call Girls in Laxmi Nagar Delhi Call 9990771857delhimodel235
 
Jagat Puri Call Girls : ☎ 8527673949, Low rate Call Girls
Jagat Puri Call Girls : ☎ 8527673949, Low rate Call GirlsJagat Puri Call Girls : ☎ 8527673949, Low rate Call Girls
Jagat Puri Call Girls : ☎ 8527673949, Low rate Call Girlsashishs7044
 
SHIVNA SAHITYIKI APRIL JUNE 2024 Magazine
SHIVNA SAHITYIKI APRIL JUNE 2024 MagazineSHIVNA SAHITYIKI APRIL JUNE 2024 Magazine
SHIVNA SAHITYIKI APRIL JUNE 2024 MagazineShivna Prakashan
 
How Can You Get Dubai Call Girls +971564860409 Call Girls Dubai?
How Can You Get Dubai Call Girls +971564860409 Call Girls Dubai?How Can You Get Dubai Call Girls +971564860409 Call Girls Dubai?
How Can You Get Dubai Call Girls +971564860409 Call Girls Dubai?kexey39068
 
Call Girl in Bur Dubai O5286O4116 Indian Call Girls in Bur Dubai By VIP Bur D...
Call Girl in Bur Dubai O5286O4116 Indian Call Girls in Bur Dubai By VIP Bur D...Call Girl in Bur Dubai O5286O4116 Indian Call Girls in Bur Dubai By VIP Bur D...
Call Girl in Bur Dubai O5286O4116 Indian Call Girls in Bur Dubai By VIP Bur D...dajasot375
 
Indian High Profile Call Girls In Sector 18 Noida 8375860717 Escorts Service
Indian High Profile Call Girls In Sector 18 Noida 8375860717 Escorts ServiceIndian High Profile Call Girls In Sector 18 Noida 8375860717 Escorts Service
Indian High Profile Call Girls In Sector 18 Noida 8375860717 Escorts Servicedoor45step
 
Zagor VČ OP 055 - Oluja nad Haitijem.pdf
Zagor VČ OP 055 - Oluja nad Haitijem.pdfZagor VČ OP 055 - Oluja nad Haitijem.pdf
Zagor VČ OP 055 - Oluja nad Haitijem.pdfStripovizijacom
 
Kishangarh Call Girls : ☎ 8527673949, Low rate Call Girls
Kishangarh Call Girls : ☎ 8527673949, Low rate Call GirlsKishangarh Call Girls : ☎ 8527673949, Low rate Call Girls
Kishangarh Call Girls : ☎ 8527673949, Low rate Call Girlsashishs7044
 
Retail Store Scavanger Hunt - Foundation College Park
Retail Store Scavanger Hunt - Foundation College ParkRetail Store Scavanger Hunt - Foundation College Park
Retail Store Scavanger Hunt - Foundation College Parkjosebenzaquen
 
San Jon Motel, Motel/Residence, San Jon NM
San Jon Motel, Motel/Residence, San Jon NMSan Jon Motel, Motel/Residence, San Jon NM
San Jon Motel, Motel/Residence, San Jon NMroute66connected
 
Khanpur Call Girls : ☎ 8527673949, Low rate Call Girls
Khanpur Call Girls : ☎ 8527673949, Low rate Call GirlsKhanpur Call Girls : ☎ 8527673949, Low rate Call Girls
Khanpur Call Girls : ☎ 8527673949, Low rate Call Girlsashishs7044
 
FULL ENJOY - 9953040155 Call Girls in Moti Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Moti Nagar | DelhiFULL ENJOY - 9953040155 Call Girls in Moti Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Moti Nagar | DelhiMalviyaNagarCallGirl
 
Russian⚡ Call Girls In Sector 39 Noida✨8375860717⚡Escorts Service
Russian⚡ Call Girls In Sector 39 Noida✨8375860717⚡Escorts ServiceRussian⚡ Call Girls In Sector 39 Noida✨8375860717⚡Escorts Service
Russian⚡ Call Girls In Sector 39 Noida✨8375860717⚡Escorts Servicedoor45step
 

Recently uploaded (20)

9654467111 Call Girls In Noida Sector 62 Short 1500 Night 6000
9654467111 Call Girls In Noida Sector 62 Short 1500 Night 60009654467111 Call Girls In Noida Sector 62 Short 1500 Night 6000
9654467111 Call Girls In Noida Sector 62 Short 1500 Night 6000
 
9654467111 Full Enjoy @24/7 Call Girls In Saket Delhi Ncr
9654467111 Full Enjoy @24/7 Call Girls In Saket Delhi Ncr9654467111 Full Enjoy @24/7 Call Girls In Saket Delhi Ncr
9654467111 Full Enjoy @24/7 Call Girls In Saket Delhi Ncr
 
Benjamin Portfolio Process Work Slideshow
Benjamin Portfolio Process Work SlideshowBenjamin Portfolio Process Work Slideshow
Benjamin Portfolio Process Work Slideshow
 
MinSheng Gaofeng Estate commercial storyboard
MinSheng Gaofeng Estate commercial storyboardMinSheng Gaofeng Estate commercial storyboard
MinSheng Gaofeng Estate commercial storyboard
 
Govindpuri Call Girls : ☎ 8527673949, Low rate Call Girls
Govindpuri Call Girls : ☎ 8527673949, Low rate Call GirlsGovindpuri Call Girls : ☎ 8527673949, Low rate Call Girls
Govindpuri Call Girls : ☎ 8527673949, Low rate Call Girls
 
FULL ENJOY - 9953040155 Call Girls in Karol Bagh | Delhi
FULL ENJOY - 9953040155 Call Girls in Karol Bagh | DelhiFULL ENJOY - 9953040155 Call Girls in Karol Bagh | Delhi
FULL ENJOY - 9953040155 Call Girls in Karol Bagh | Delhi
 
Low Rate Call Girls in Laxmi Nagar Delhi Call 9990771857
Low Rate Call Girls in Laxmi Nagar Delhi Call 9990771857Low Rate Call Girls in Laxmi Nagar Delhi Call 9990771857
Low Rate Call Girls in Laxmi Nagar Delhi Call 9990771857
 
Call~Girl in Rajendra Nagar New Delhi 8448380779 Full Enjoy Escort Service
Call~Girl in Rajendra Nagar New Delhi 8448380779 Full Enjoy Escort ServiceCall~Girl in Rajendra Nagar New Delhi 8448380779 Full Enjoy Escort Service
Call~Girl in Rajendra Nagar New Delhi 8448380779 Full Enjoy Escort Service
 
Jagat Puri Call Girls : ☎ 8527673949, Low rate Call Girls
Jagat Puri Call Girls : ☎ 8527673949, Low rate Call GirlsJagat Puri Call Girls : ☎ 8527673949, Low rate Call Girls
Jagat Puri Call Girls : ☎ 8527673949, Low rate Call Girls
 
SHIVNA SAHITYIKI APRIL JUNE 2024 Magazine
SHIVNA SAHITYIKI APRIL JUNE 2024 MagazineSHIVNA SAHITYIKI APRIL JUNE 2024 Magazine
SHIVNA SAHITYIKI APRIL JUNE 2024 Magazine
 
How Can You Get Dubai Call Girls +971564860409 Call Girls Dubai?
How Can You Get Dubai Call Girls +971564860409 Call Girls Dubai?How Can You Get Dubai Call Girls +971564860409 Call Girls Dubai?
How Can You Get Dubai Call Girls +971564860409 Call Girls Dubai?
 
Call Girl in Bur Dubai O5286O4116 Indian Call Girls in Bur Dubai By VIP Bur D...
Call Girl in Bur Dubai O5286O4116 Indian Call Girls in Bur Dubai By VIP Bur D...Call Girl in Bur Dubai O5286O4116 Indian Call Girls in Bur Dubai By VIP Bur D...
Call Girl in Bur Dubai O5286O4116 Indian Call Girls in Bur Dubai By VIP Bur D...
 
Indian High Profile Call Girls In Sector 18 Noida 8375860717 Escorts Service
Indian High Profile Call Girls In Sector 18 Noida 8375860717 Escorts ServiceIndian High Profile Call Girls In Sector 18 Noida 8375860717 Escorts Service
Indian High Profile Call Girls In Sector 18 Noida 8375860717 Escorts Service
 
Zagor VČ OP 055 - Oluja nad Haitijem.pdf
Zagor VČ OP 055 - Oluja nad Haitijem.pdfZagor VČ OP 055 - Oluja nad Haitijem.pdf
Zagor VČ OP 055 - Oluja nad Haitijem.pdf
 
Kishangarh Call Girls : ☎ 8527673949, Low rate Call Girls
Kishangarh Call Girls : ☎ 8527673949, Low rate Call GirlsKishangarh Call Girls : ☎ 8527673949, Low rate Call Girls
Kishangarh Call Girls : ☎ 8527673949, Low rate Call Girls
 
Retail Store Scavanger Hunt - Foundation College Park
Retail Store Scavanger Hunt - Foundation College ParkRetail Store Scavanger Hunt - Foundation College Park
Retail Store Scavanger Hunt - Foundation College Park
 
San Jon Motel, Motel/Residence, San Jon NM
San Jon Motel, Motel/Residence, San Jon NMSan Jon Motel, Motel/Residence, San Jon NM
San Jon Motel, Motel/Residence, San Jon NM
 
Khanpur Call Girls : ☎ 8527673949, Low rate Call Girls
Khanpur Call Girls : ☎ 8527673949, Low rate Call GirlsKhanpur Call Girls : ☎ 8527673949, Low rate Call Girls
Khanpur Call Girls : ☎ 8527673949, Low rate Call Girls
 
FULL ENJOY - 9953040155 Call Girls in Moti Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Moti Nagar | DelhiFULL ENJOY - 9953040155 Call Girls in Moti Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Moti Nagar | Delhi
 
Russian⚡ Call Girls In Sector 39 Noida✨8375860717⚡Escorts Service
Russian⚡ Call Girls In Sector 39 Noida✨8375860717⚡Escorts ServiceRussian⚡ Call Girls In Sector 39 Noida✨8375860717⚡Escorts Service
Russian⚡ Call Girls In Sector 39 Noida✨8375860717⚡Escorts Service
 

How to secure your enterprise data during Covid-19

  • 1. ITProPortal is supported by its audience. When you purchase through links on our site, we may earn an a liate commission. Learn more (Image credit: Future)      How to secure your enterprise data during Covid-19 By Chris Henderson 4 hours ago Top ways businesses can protect employees while ensuring the security and future of their organisation. As COVID-19 continues to spread, millions of people around the world are forced to work remotely. Yet, simultaneously there is increasing evidence to show that malicious threat actors are using concerns of the virus to prey on those same individuals. Given this, it is more important than ever that organisations implement the necessary technology to backup their data in the event of downtime or should an employee fall victim to a ransomware attack. While ensuring remote workers are fully backed up is more critical today than prior to the prevalence of the virus, the good news is that the process to back up enterprise data isn’t much di erent than it was during normal business operations. It all comes down to risk mitigation. In today’s climate, work machines are being used as personal machines and personal machines as work machines, further blurring the lines of security and increasing the chance of a worker falling victim to a phishing scam. As millions of people work from home, these assets are much more likely to fall victim to a power surge and other disasters not normally present in an o ce. If sensitive data isn’t backed up, it can be lost for good. Typically, home o ces don’t have onsite IT sta , which means if an individual su ers We'd like to send you notifications for the latest news and updates. ALLOWNO THANKS
  • 2. from a phishing scam, ransomware attack, or loses power, and consequently loses data, while remote, the total recovery time increases signi cantly. Keeping all this in mind, here are the top points businesses should consider in order to protect employees while ensuring the security and future of their organisation. Coronavirus-related phishing email attacks up 600 percent Consider key backup technologies At the corporate IT level, all backup strategies should remain in place. This means that network adjacent backups should be up and running, requiring organisations to take a proactive approach to periodically check all devices to ensure that they are working properly. Additionally, now that almost all teams are working remotely, there are three speci c types of backups employers should consider.   File level and endpoint backups: The rst type of backup, and most secure, involves organisations  ranking their critical functions, this includes full backups for remote workers. Enterprise-level File Sync and Share technologies support the backup of local les in a designated folder. These types of backups may also include remote disk level protection enabling quick restoration to a new machine if needed. This makes these backup technologies the most frequently used and the most secure choice. SaaS provided backups: Second, there are many SaaS o erings that include backups of data in the form of versioning, including Google Apps and O ce 365. These tools rely on the user to stay within the provided IT environment and are undermined heavily by shadow IT. Local backups: Local backups are the third option to consider, and traditionally the least secure. This is because they are only as strong as the home network, which is inherently vulnerable to attacks and disaster. The same event that may require a backup will likely impact any local protection. Securing endpoints is no longer just installing antivirus, rather it encompasses managing the hygiene of all endpoints, including con guration and patching. Ensure you have a remote monitoring and management tool (RMM), which enables organisations to monitor the status of new assets entering an environment remotely and issue patches where necessary. By implementing an RMM technology solution, organisations can rest assured that in the event an employee does fall victim to a cyberattack while working remotely, the organisation has the proper tools in place to review and manage the situation and prevent the attack from escalating. Finally, while local backups are a convenient option, they should be avoided because they are not as secure as le level or even SaaS provided backups. When dealing with backup providers, it’s also critical to con rm whether the backup provider has geographical redundancy. Geographical redundancy empowers businesses to anticipate which remote workers could be impacted, which may lead to longer response times to data centre outages. Geographically separating your critical backups will help ensure that should an outage occur within the infrastructure of your backup provider, it will not result in an outage for your clients.   Identify who collects and organises backups across a distributed user environment Managed services providers (MSPs) are responsible for ensuring their customers have the necessary tools and resources to remain up and running. Many business requirements are changing as sta move to remote work and businesses augment to operate during these times. MSPs should connect with their customers to better understand their needs in this new remote environment to ensure their backups are happening regularly and securely. Avoid assuming that backups are immune from a cyberattack. Speci cally, while COVID-19 cases continue to grow in the United States and more individuals remain in quarantine, state sponsored attackers in other regions around the world are becoming more prevalent. Delaying an organisation’s backup security audit is a mistake that could lead to a successful ransomware attack and ultimately jeopardise the fate of the company. Coronavirus could 'expose limitations of the cloud' Look ahead to brighter days As we look towards the future when we can return to normal routines, it’s important to manage expectations around full immediate ramp-up. For example, businesses should proceed with caution before rapidly shipping out assets to support remote work. It is We'd like to send you notifications for the latest news and updates. ALLOWNO THANKS
  • 3.  GET WEEKLY NEWS AND ANALYSIS Sign up below to get the latest from ITProPortal, plus exclusive special o ers, direct to your inbox! No spam, we promise. You can unsubscribe at any time and we'll never share your details without your permission. MOST READ MOST SHARED YourEmailAddress SIGN M ENTERPRISE DATA COVID-19 CORONAVIRUS TOPICS critical to keep track of the inventory being sent out, and the machines that have access to your critical data. Make sure your IT and security teams are equipped to monitor any potentially privileged machines sent out to provide the proper care required and reduce the risk of a successful cyberattack. Finally, once normal work routines resume, place extra care to collect any privileged machines which are no longer needed. Keep in mind, there is a light at the end of the tunnel and we are all in this together. Taking the extra time to develop a proactive plan with the proper technology, that keeps the business, MSP, and employees in mind, will put the organisation as a whole in a better place for when we can all return to life as normal. New coronavirus malware 'trashes' Windows PCs Chris Henderson, Director, Information Security, Datto Get updates from all sorts of things that matter to you SUBSCRIBE TO PUSH NOTIFICATIONS Datemyage.com | Sponsored StrategyCombat | Sponsored Where do mature singles meet in Marikina? Play this Game for 1 Minute and see why everyone is addicted ITProPortal Less than half of businesses provide cybersecurity training Training is critical to ensuring staff don't become insider threats. Work From Home | Search Ads | Sponsored Work From Home Jobs in the USA May Pay More Than You Think We'd like to send you notifications for the latest news and updates. ALLOWNO THANKS
  • 4. MOST READ MOST SHARED 2 How to turn o "OK Google" Android voice search 3 How to insert a tick or a cross symbol in Microsoft Word and Excel 4 How to set a background picture on your Android or iOS smartphone 5 How to start page numbering from a speci c page in Microsoft Word ITProPortal is part of Future plc, an international media group and leading digital publisher. Visit our corporate site. © Future Publishing Limited Quay House, The Ambury, Bath BA1 1UA. All rights reserved. England and Wales company registration number 2008885. 1 South Korea is the rst country to launch 5G About us Terms and conditions Privacy policy Cookies policy Advertise with us We'd like to send you notifications for the latest news and updates. ALLOWNO THANKS