IronTree BLOG


  • Ransomware Attack: WannaCry Update

    Ransomware Attack: WannaCry Update

    The WannaCry ransomware attack on Friday 12 May 2017 was a shock to businesses around the world and a wake-up call to all computer users. In the space of a few hours the ransomware spread like wildfire, and by Monday morning more than 200 000 computers in 150 countries had been infected.

    Backup companies were then faced with a flurry of calls from small to medium-sized businesses who had not yet employed  backup services, and external hard-drives have been selling well since.

    Read More  

  • How safe is your business?

    How safe is your business?

    In today’s web-driven world where email and data move incredibly fast and extensively, we have increasing opportunity to do business locally and worldwide. But with this opportunity has come threat: to our ideas, our communication, our data and our business transactions.

    Read More  

  • National Shutdown protest

    National Shutdown protest

    IronTree actively participated in the National Shutdown protest on Friday 7 April 2017, believing it imperative to stand together against corruption and the unlawful behaviour of our country’s governing leaders. Employees took to the Main Road to join the human chain, standing together in hope and solidarity, and then told us how they felt about the protest and what motivated them to take part.

    Read More  

  • Common frustrations of all business owners – what can you do?

    Common frustrations of all business owners – what can you do?

    Are you a business owner who experiences IT trouble of some sort daily, weekly or monthly?

    Well, all business owners experience IT trouble of some sort, even if it’s just the phone lines being down or the Internet connection being temporarily off line. Now that the Internet plays such a fundamental role in our business and personal lives, technical issues crop up more often because of all the electronic devices we use and and have come to rely on for communication.

    It’s one thing when you’re having trouble loading your Internet browser to check the news, but when you can't send an important email to a waiting client because your server is down, it’s much more serious – your business and productivity are at stake.

    Read More  

  • What Do You Need To Grow Your Business Online?

    What Do You Need To Grow Your Business Online?

    Growing your business online isn’t an option anymore – it’s a necessity. Remaining relevant in a world where consumers look to online platforms for information, advice and often immediate service has never been more important for both the growth and survival of your business. With an ever increasing variety of online platforms to choose from, developing and maintaining a striking online presence can seem a daunting task, but it needn’t be. A solid strategy and professional online communication can be the catalyst for not only growth, but vigorous expansion of your business and its offerings.

    Read More  

  • Business Continuity overview

    Business Continuity overview

    IronTree has partnered with Plan4continuity.com to offer its customers cloud-based business continuity planning services.

    Plan4Continuity software allows you to plan, build, schedule, simulate, implement and audit your business continuity in an easy-to-use, affordable and logical way.

    Read More  

  • Internet security software is required to keep your payroll data safe from identity theft [infographic]

    Internet security software is required to keep your payroll data safe from identity theft [infographic]

    "Identity theft is a form of fraud that steals someone else's personal information to access private resources such as medical records or bank accounts, and often leads to expensive consequences for its victims."

    American research estimates that 1 in every 10 consumers has been a victim of identity theft and that the average loss suffered by a victim is equivalent to three months' salary.

     

    Read More  

  • Why accountants need to know about anti-spyware

    Why accountants need to know about anti-spyware

    "Spyware is a form of network monitoring software that aids in gathering information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge.

     

    Read More  

  • How to block websites that kill productivity

    How to block websites that kill productivity

    Is unrestricted internet access killing productivity in your business?

    The pervasive growth and universal adoption of the internet and technology tools have impacted massively on businesses of all types and sizes. The ability to instantly communicate, respond to customer requirements and share information has raised business efficiencies and customer service levels immeasurably over the past decade (or two!) Think about it - could your business survive in today's 'instant gratification' economy without computers, email, internet connectivity and mobile devices?

     

    Read More  

  • Companies need cloud backup and individuals need cloud storage

    Companies need cloud backup and individuals need cloud storage

    Cloud backup has got one purpose and one purpose only: to back up data in whatever form - be it databases, documents or spreadsheets - that are critical to the ongoing function of a business or individual and to store that information on cloud based servers with incremental backups occurring at least every day.

    Read More  

  • What is malware?

    What is malware?

    What is malware? Malware in short stands for malicious software. When we look at malware as a whole, we find that it can be broken up into many different types of malicious software, which include computer viruses, ransomware, worms and Trojan horses to name but a few.

     

    Read More  

  • IT support companies need to offer mobile device management

    IT support companies need to offer mobile device management

    Scenario 1

    The sales director at one of your clients has a lunch meeting with a strategic business partner to discuss a large pending deal. Naturally, the director has his tablet with him, with all of the information pertinent to the discussion (as well as all corporate information; email, contacts, text messages etc.). After lunch, while on his way back to the office, the sales director realizes that he has left his tablet on the table at the restaurant. He rushes back to the location to no avail, the tablet is nowhere to be found.

     

    Read More  

  • Are you backing up the correct Data?

    Are you backing up the correct Data?

    In the last few years, it has become common practice for companies to install some kind of backup procedure. However, implementations often fail to take a holistic view of the organisation’s data continuity requirements: important files are not included, all data sources aren’t factored in, application data is overlooked, formats are neglected, etc.

    Read More  

  • What is Ransomware?

    What is Ransomware?

    Essentially a Ransomware attack occurs when your files and information are encrypted by a cyber criminal and held hostage. In order to decrypt your files and information you are forced to pay a ransom to the cyber criminal, using some form of untraceable digital currency like bitcoins.

    Read More  

  • Why Panda Adaptive Defense 360

    Why Panda Adaptive Defense 360

    Panda Adaptive Defense 360
    Despite continued and increased investment in security, traditional antivirus solutions are being rendered inefficient due to the complexity and sophistication of new malware.

    Read More  

  • Why are cloud services trending?

    Why are cloud services trending?

    It seems to me that we’ve come full circle! From the 70’s and 80’s era of mainframe centralised data processing (admittedly only for large corporations and research centres) to stand-alone personal computers, followed by local area networks and on premise “client-server” environments. It seems that the current global trend is towards “cloud computing”. It’s almost as if cloud computing is the modern, efficient and affordable mainframe - available to all!

    Read More  

  • Why it’s important that your IT environment has its own guardian angel.

    Why it’s important that your IT environment has its own guardian angel.

    Panda Cloud Fusion is a 21st century guardian angel. Simply put, it provides business owners, IT support professionals and IT administrators with the ability to proactively manage their IT environments and ensure that their infrastructure is always safe, secure and running efficiently.

    Read More  

  • The best business owners back up - why?

    The best business owners back up - why?

    Backing up data is a business-critical function for the modern organization and ensuring your data is secured against loss, theft or corruption categorizes you as a good and wise business owner. Larger organizations with multiple offices located over wide geographical regions should have backup strategies in place that include reliable offsite backup routines. Cloud backups guarantees recovery of lost or corrupt business data and thus contribute greatly to business continuity.

    Read More  

  • A few books that could help you plan for business continuity, and what then?

    A few books that could help you plan for business continuity, and what then?

    Whether you are starting a new business or running a well-established one, your company should have a comprehensively designed and implemented business continuity plan in place. When creating a business continuity plan or revising one, the best way to get started is to read some books on the subject. Below are a few resources we think hold valuable and relevant information on the topic and contribute to a high-level business continuity plan.

    Read More  

  • Why it’s imperative to find a cloud management system that’s user friendly?

    Why it’s imperative to find a cloud management system that’s user friendly?

    When considering systems management software, there are two main factors that need to be considered: user-friendliness and intuitiveness.

    Why these two factors?

    Read More  

  • The future of antivirus - What is Panda Antivirus doing?

    The future of antivirus - What is Panda Antivirus doing?

    The future of antivirus - What is Panda Antivirus doing?
    The increasing variety and sophistication of malware has rendered traditional antivirus detection ineffective and cumbersome. Panda has long seen this problem and, as a result, has been evolving its methods of detection over the last five years.

    Read More  

  • What does the future look like for Business Recovery Software?

    What does the future look like for Business Recovery Software?

    Current global industry trends indicate that the use of business recovery software is on the rise and soon will be common practice. This is due to traditional recovery and backup methods, such as local storage devices, no longer being sufficient to ensure the recoverability of a business’ information assets.

    Read More  

  • It’s back up time-What to back up at the end of the year

    It’s back up time-What to back up at the end of the year

    Why data backup is especially important over the festive season
    A long year is drawing to a close with people and services slowing down in light of the approaching festive season. Before your business shuts down, however, there are a number of considerations that need to be taken into account. And one of these is making sure that all your business-critical data is backed up offsite over the festive season. Especially considering that this time of year is a high risk time for data loss to occur.

    Read More  

  • 7 things you need to know about Antivirus

    7 things you need to know about Antivirus

    In a data-dependent world, the need for antivirus software is increasing. This is due to the volumes of information generated, stored and transmitted on a daily basis and businesses’ reliance on this movement of precious cargo to continue unhindered. As a result, the value of information assets has grown drastically and so has the need to protect it. So let us take a look at why, when protecting your data, you should take into account the following key facts:

    Read More  

  • The latest from disaster recovery services: Industry News

    The latest from disaster recovery services: Industry News

    Data has become extremely valuable and is one of the key drivers of business growth. The requirement to secure and ensure recoverability of crucial business data is a major emerging trend to date. This article will highlight reasons for this trend as well as how you can proactively manage associated risks and thus ensure that you have a disaster recovery plan in place.

    Read More  

  • Why must you back-up - horror stories.

    Why must you back-up - horror stories.

    What cloud backups mean for you and your business.

    Cloud backup has been on the scene for quite a few years now, but sadly is still viewed with a level of distrust and contempt by individuals who don’t fully understand the underlying technologies that make it possible. However, cloud backup has become a business imperative for any company today.

    Read More  

  • Recovery Software is growing dollar value of IT industry

    Recovery Software is growing dollar value of IT industry

    Have you ever had the ignominy of deleting or losing an important file by accident or as a result of malware infection or hard-drive failure? You may have tried to recover the file by using file recovery software or sent your hard-drive to recovery experts, but more often than not you will find that the file has been lost forever.

    Read More  

  • What makes Panda Antivirus different?

    What makes Panda Antivirus different?

    What sets Panda Antivirus apart from the rest?

    Using the correct antivirus has become more and more important in an age that is technologically driven and demanding. Internet access has become an everyday requirement that brings with it major conveniences - and some threats to consider also.

    Read More  

  • How cloud system management can streamline your work

    How cloud system management can streamline your work

    Centralized cloud management
    Every IT person would like to be able to manage their clients’ PCs remotely with the ability to log on from anywhere and perform tasks without the need to travel long distances.

    Read More  

  • What to backup - a critical look at your data.

    What to backup - a critical look at your data.

    Cloud backup: What should I back up?
    Scenario: Your server crashes and your IT team scrambles to get it up and running. After discovering that the hard drive has crashed and the data on it has become inaccessible, you contact your cloud backup provider to begin a restore of your data. But this is where things get tricky, because as it happens, the wrong data was selected for backup.

    Read More  

  • What to look for when looking for an Anti-Virus

    What to look for when looking for an Anti-Virus

    Today, there’s almost no excuse for downtime. As the world increasingly adopts cloud technologies and as a service offerings expand, we’re on the verge of providing continuity of IT systems in almost any given instance. Users have also adopted the “always-on” culture thanks to internet ubiquity. But with this interconnectedness comes inherent risks; users need to know that their computers, laptops and devices are safe on and offline since we`re entrusting so much information to our hardware on a daily basis.

    Read More  

  • When using Pastel,you need a reliable online Pastel backup service

    When using Pastel,you need a reliable online Pastel backup service

    The vast majority of small-to-medium enterprises (SMEs) in South Africa use some iteration of the Sage Pastel software platform. As with any software out there, things do go wrong at times: data gets corrupted or deleted, hard drives crash or tape drives fail at the most inopportune time. The sad reality is that many businesses do not have backups, let alone business continuity in mind at all. They often leave backups on the back burner or backup to flash and external drives. This lack of data security strategies can cost organisations dearly.

    Read More  

  • How safe is offsite really? Continuity and disaster recovery considerations for IT managers

    How safe is offsite really? Continuity and disaster recovery considerations for IT managers

    I often cringe when I hear people say that they don't need offsite backups because they back up on a flash drive or external hard drive.

    Read More  

  • Five crucial capacity planning considerations for IT managers

    Five crucial capacity planning considerations for IT managers

    We've all called a customer support line only to get told that 'due to high call volumes, waiting times may be long'. As frustrating as it is for customers, it's even more frustrating for support agents at the receiving end of an irate client's tirade (I have been there countless times). Another source of frustration is hearing (or saying), 'Please bear with me, our systems are (always) slow.' This is an example of bad capacity planning and a lack of research for sure.

    Read More  

  • Beware when connecting to public Wi-Fi networks

    Beware when connecting to public Wi-Fi networks

    Don't simply assume that your data is safe when connecting to public Wi-Fi networks - you could be putting yourself at risk. Always keep a keen eye out for the following:

    Read More  

  • A sneak peek into a cybercriminal's toolkit

    A sneak peek into a cybercriminal's toolkit

    We found this great article highlighting the different tools that cybercriminals use to get access to critical data and wreak havoc.

    Read More  

  • Pulse tracks what is trending in SA

    Pulse tracks what is trending in SA

    A new tool developed tracks various sources of content in South Africa and graphically depicts what is trending in the country. They say the growth of internet penetration in SA has made this data interesting.

    Read More  

  • As Kauai is sold, it reminds us of backup for franchises

    As Kauai is sold, it reminds us of backup for franchises

    Real Foods have bought the Kauai Group after 19 years in operation, the reason this got us thinking of backup is because food franchises have a high risk of disaster to IT equipment because they are hot and humid places.

    Read More  

  • Facebook Messenger now accounts for 10% of global mobile VoIP usage

    Facebook Messenger now accounts for 10% of global mobile VoIP usage

    VoIP (Voice over Internet Protocol) uses much more bandwidth that browsing social media. If your employees are doing both, they could be slowing down your network, as well as taking up work time.

    Read More  

  • Telkom's price cut makes online backup a logical step for businesses

    Telkom's price cut makes online backup a logical step for businesses

    With price cuts on broadband offerings from Telkom on the cards, all service providers should take their cue from this incentive. Internet maturity in South Africa makes online backup even more feasible - and a logical choice - for businesses. With hosted services being adopted at increasing rates, the improvement in bandwidth offerings couldn,t have come at a more opportune time.

    Read More  

  • Is your data protected against looting?

    Is your data protected against looting?

    Protests and marches are not always peaceful events. Should things turn violent, your business may be subjected to destruction as unhappy protestors rampage through an area. Rioting almost always leads to looting, which may result in your computers being stolen or broken.

    Read More  

  • Both rented and owned office premises require on-site backup servers

    Both rented and owned office premises require on-site backup servers

    One of the benefits of renting premises in an office park is that the landlord may have already set up an on-site backup solution for the office park.

    Read More  

  • Cloud-hosted solutions create great reseller opportunities

    Cloud-hosted solutions create great reseller opportunities

    The reseller dilemma: how does one grow a sustainable, profitable business whilst simultaneously providing easy-to-support value-added solutions and great customer service? Often the cost of matching customer expectations with the required service capability lands up exceeding the revenue generated. Today's reseller opportunities must encompass recurring revenue generating streams at manageable cost levels.

    Read More  

  • Don't let load shedding cripple your business

    Don't let load shedding cripple your business

    Unless you have been holed up in a bunker or living off the grid, you would already have felt the effects of load shedding. Like it or not, it looks like the problem is here to stay for a while. Businesses can help improve the situation by conserving power, using natural light and even using solar power. That is not enough, however. Businesses also need to safeguard themselves against load shedding.

    Read More  

  • Cloud-based disaster recovery is set to take over the business continuity market

    Cloud-based disaster recovery is set to take over the business continuity market

    How topical it is to write about disaster recovery, when our electricity grid run by Eskom is so close to total collapse? What will happen to your business, should this happen? How does one keep it all going when our basic infrastructure is under serious threat?

    Read More  

  • Eight little-known facts about web filtering software

    Eight little-known facts about web filtering software

    We have compiled a list of eight little-known facts about web filtering software that you may not have thought about:

    Read More  

  • Entrepreneur's Guide: Five top reasons for businesses failing in 2014

    Entrepreneur's Guide: Five top reasons for businesses failing in 2014

    It's New Year's resolution time again. 'Get skinny.' 'Be more successful.' 'Be nice to people.' Besides the usual self improvement resolutions, you're probably asking yourself what 2015 has in store for you and your business. Of course, this will really depend on how sustainable your business is and what the growth prospects are.

    Read More  

  • Poor service delivery and what it means to run a business in the Zuma years

    Poor service delivery and what it means to run a business in the Zuma years

    "Dear Customer, fault 191CWK18112345 has been created for your service ID. Telkom will endeavour to resolve this problem within two days."

    The problem, however, is that someone opened up the Telkom cable ducts, tied a big chain around the cables, attached this to their pickup truck's tow bar and pulled a few hundred metres of cable out of the ground.

    Read More  

  • Why Sage Pastel Partner Advantage should be your accounting package of choice

    Why Sage Pastel Partner Advantage should be your accounting package of choice

    In South Africa and most of the rest of Africa, Sage Pastel Partner Advantage is the accounting system of choice for medium and large businesses looking for desktop accounting software. Its entry-level option, Sage Pastel Xpress, is used by many thousands of small businesses to run their accounting.

    Read More  

  • How does IP telephony feature in your business planning?

    How does IP telephony feature in your business planning?

    Think about the essential elements that are required to ensure business continuity: a physical location to work from, a consistently available power supply, the basic technology components to enable you to process financial transactions, and business required communications in the form of email and telephony.

    Read More  

  • How much should businesses spend on business continuity?

    How much should businesses spend on business continuity?

    This is a really tough question. How can I determine how much you need to spend to ensure that you have adequate business continuity plans in place? This will depend upon how much is required to ensure you have built-in redundancy for the services that your business relies upon.

    Read More  

  • The Ten Commandments of remote desktop managers for IT professionals

    The Ten Commandments of remote desktop managers for IT professionals

    We live in a fast-paced world of instant gratification and our lives depend largely on 'always on' technology platforms, both in the business world and in our personal lives. Companies, large and small, demand zero downtime on their computing devices.

    Read More  

  • Block websites that fall into these categories

    Block websites that fall into these categories

    NSFW - if you don't know by now, this is an abbreviation for 'Not Safe for Work'. The main reason for a website being classified as NSFW is because the content is pornographic or illegal in nature.

    Read More  

  • Five flaws most companies make in their disaster recovery plan

    Five flaws most companies make in their disaster recovery plan

    It may seem difficult to understand business continuity planning - also known as a disaster recovery plan - but in reality, it just comes down to common sense. It's about planning how you're going to deal with the issues your business might face and setting up your business in a way that ensures robustness and constant improvement.

    Read More  

  • Business impact analysis in a nutshell

    Business impact analysis in a nutshell

    Firstly, what is business impact analysis?

    "A business impact analysis (BIA) is a process that identifies and evaluates the potential effects (financial, life/safety, regulatory, legal/contractual, reputation and so forth) of natural and man-made events on business operations." - Gartner.

    Read More  

  • Best practices for secure email for financial service providers

    Best practices for secure email for financial service providers

    I think it's safe to say that the days of transmitting information via 'snail mail', fax and inter-office 'postmen' are a thing of the past. Our world of instant gratification demands that information is transmitted instantly electronically. More than ever, your email and the data transmitted via email needs to be taken seriously. Financial service providers deal with confidential personal information, including financial reports, payroll information and often the contact details and private information of high net worth individuals.

    Read More  

  • Your business continuity plan: five must-have items

    Your business continuity plan: five must-have items

    Business continuity planning and managing one's business are definitely top of mind for a lot of business owners and managers. This is especially true in the tricky waters of South Africa, where infrastructure is no longer guaranteed.

    Read More  

  • Social media trends in South Africa and how they affect your business

    Social media trends in South Africa and how they affect your business

    The South African Social Media Landscape 2014 report was recently released by Fuseware.net and World Wide Worx. It's a very interesting read - check it out here. .

    Some of the key statistics and findings that we found relevant - as well as some deductions as to how this could affect your business - follow:

    Read More  

  • Why online backup is becoming big in the medical industry

    Why online backup is becoming big in the medical industry

    It is now becoming common practice for the medical industry to make use of online backup to store information. The reasons for this are more apparent than one may think.

    Read More  

  • If your computer virus protection solution was an employee, what interview questions would you ask it?

    If your computer virus protection solution was an employee, what interview questions would you ask it?

    It's great living in today's 'global village' with our ability to instantly access information, conduct research and find the best products and solutions for our needs. On the other hand, the broad scope and never-ending allied source of information at our fingertips sometimes 'spoils us for choice' and actually makes it more difficult to make decisions. Do you sometimes wish that you could have a one-to-one dialogue that could simplify the decision?

    Read More  

  • Business disaster management and the importance of planning

    Business disaster management and the importance of planning

    At any given moment, there is some disaster, natural or unnatural, somewhere in this world where people are affected on a large scale. One does not have to be at the epicentre of an earthquake to suffer the repercussions of a disaster. Disaster can strike at any time and place and can affect businesses critically.

    Read More  

  • Internet and social trends in business: is there a need for web filtering software?

    Internet and social trends in business: is there a need for web filtering software?

    What are people really doing when they're on the clock? If you ask an employee, he or she will probably tell you they're 'working' all day, but we know this is hardly ever 100% true. The simple truth is that people waste a lot of time at work. Historically - before the era of pervasive technology - wasted time was evidenced by extended smoke breaks, loitering at the water cooler and 'long lunches'. At least it was easy to track these physical work digressions. Today, people are likely to waste even more time using social media, browsing the web, downloading music and video content and communicating with friends around the globe using chat forums. This form of time wasting is far more dangerous.

    Read More  

  • Panda antivirus - real world protection test (infographic)

    We've all been to a doctor at some point in our lives to be vaccinated in order to either preclude entirely or reduce the risk of being infected by a particular strain of virus or other infectious 'bug'.

    Read More  

  • Five ways cloud computing is making small businesses better

    Five ways cloud computing is making small businesses better

    Cloud computing essentially means using applications and services that are hosted on the internet and that typically charge you a monthly or similar fee for usage only.

    Cloud computing is the way many small businesses are moving in terms of their business computing.

    Read More  

  • Tips for spring-cleaning your cloud storage or cloud backup

    Tips for spring-cleaning your cloud storage or cloud backup

    In South Africa we are fast approaching spring, the time to spring-clean and clear out all the cobwebs of winter.

    If you’re using cloud storage or cloud backup, it’s time to ensure that you’re only backing up what you need and keeping your usage down. We all accumulate so many documents and spreadsheets on an ongoing basis, it is important to discard or clear out those that are no longer useful.

    Read More  

  • Effective patch management for IT managers and service providers

    Effective patch management for IT managers and service providers

    Ransomware, spamware, malware, virus attacks and unauthorised device access – these are all very real business threats. Keeping your server and client devices up to date with the latest patches is vital to ensuring that your business is not compromised or threatened in any way by these threats.

    Read More  

  • Common misconceptions about data recovery services for SME businesses

    Common misconceptions about data recovery services for SME businesses

    Correct data recovery services are an essential part of business continuity planning and should be a part of every businesses plan. Here are some common misconceptions we have heard small business owners talk about when discussing data recovery services:

    Data recovery services are an unnecessary expense.

    Read More  

  • Our secret recipe for business IT solutions in food franchises

    Our secret recipe for business IT solutions in food franchises

    Franchise brands are built on ensuring a consistent look and feel; both as applied to the physical appearance of a franchise outlet as well as the appearance and taste of their products. For example, a burger from the Mountain Eagle Spur in Windhoek looks and tastes just like a burger from the Seven Spur in Cape Town. Furthermore, the look and feel of both Spurs' decor is also generally the same.

    Read More  

  • The connection between online backup and business continuity

    The connection between online backup and business continuity

    Kaizen is the Japanese word for improvement. In philosophical terms, it really encapsulates a business philosophy of continuous improvement prevalent in Japan.

    To me, kaizen is how one should approach one's business, and in reality all aspects of one's life.

    Read More  

  • The A - Z of computer management

    The A - Z of computer management

    Effective, efficient computer management is as easy as learning your ABCs. Here's everything you need to know:

    Read More  

  • Free antivirus software solutions put corporate data at risk

    Free antivirus software solutions put corporate data at risk

    In today's super-connected, 'always on' world, it's critical that every company director, manager and employee is aware of the threat of data theft, identity theft and the host of other threats that your company is exposed to if your end point protection solution is insecure. Whilst corporate policy and employee induction and training are essential components of corporate security, there are some simple ways to make sure that your data is not easily comprised.

    Read More  

  • How backup programs back up accounting software databases

    How backup programs back up accounting software databases

    When selecting data to back up, it is relatively easy to select all of one's Excel spreadsheets and Word documents. These are typically stored in a folder on your machine. To select these for backup, you simply select the folder that they are stored in for ongoing backup. Any new and existing documents and spreadsheets are then backed up on an ongoing basis.

    Read More  

  • 75% of SMEs cite cloud backup as the most important cloud product

    75% of SMEs cite cloud backup as the most important cloud product

    Small and medium enterprises (SMEs) are the growth engine of most modern economies. With South Africa's high unemployment rate and structural economic problems, SMEs really are the last hope for creating new jobs and growing a diversified and strong economy.

    Read More  

  • Five industries that will benefit from mobile device management

    Five industries that will benefit from mobile device management

    It's hard to believe that less than two decades ago, mobile phones were exactly that - devices that allowed us to make and receive telephone calls whilst mobile. Laptop computers were luxury items usually only enjoyed by company owners and directors. In those days, smartphones, iPads and tablet devices may well have been fanciful, futuristic devices created by 'Q' and used by James Bond.

    Read More  

  • 10 questions to ask your offsite backup provider before purchasing

    10 questions to ask your offsite backup provider before purchasing

    Choosing a backup provider isn't an easy task, it may not be a massive capital outlay but the value of your data and the importance of it should not be taken lightly.

    One needs to look at the amount to pay on a monthly basis - I think that the benefits of online, offsite backup are pretty clear by now and are articulated in many of our previous blogs.

    Read More  

  • Nine great reasons to offer remote IT support

    Nine great reasons to offer remote IT support

    Do you find yourself wasting valuable time sitting in traffic on the way to see clients? Do your costs of providing support continually increase as a result of toll fees, ever-increasing fuel costs and vehicle insurance premiums?

    Read More  

  • Mobile antivirus software: necessity or nice to have?

    Mobile antivirus software: necessity or nice to have?

    It's said that the average smart phone user checks his or her smart phone about 34 times per day. In reality, I reckon my teenage children check their smart phones about 334 times per day! Sending emails, speaking to customers, conducting web research and connecting to required corporate databases and business applications has become an essential component of both our business and personal lives. These days, smart phones are used to do all of the above.

    Read More  

  • Why South Africans need to review their IT security practices

    Why South Africans need to review their IT security practices

    President Jacob Zuma signed the Protection of Personal Information Act (POPI) into law on 27th November 2013. The bill will see companies needing to protect consumers' private information at all costs. Failure to do so will result in penalties and fines. In a recent article, Samuel Mungadze says, "Companies will face potential multimillion-Rand fines, civil claims and reputational damage unless they upgrade IT security systems ahead of the implementation of new privacy laws."

    Read More  

  • The harsh realities of not implementing an internet usage monitor

    The harsh realities of not implementing an internet usage monitor

    Have you implemented an internet usage monitor policy at your company? Have you ever considered why an internet usage monitor is critical in today's connected global environment?

    The obvious threats to uncontrolled internet usage include

    Read More  

  • The future of business continuity management

    The future of business continuity management

    We recently spent an entire day in our offices without electricity due to an unexpected power cut by the City of Cape Town. Fortunately we had anticipated this earlier on in the year and invested in generators to keep our offices going. So as we continued working with full telephone and internet access available to us, to the raucous sound of our generator going about its business, we watched as our neighbours all downed tools and waited six hours for the power to come back on.

    Read More  

  • Optimise PC support with computer management solutions.

    Optimise PC support with computer management solutions.

    If you are a company's IT manager or a professional IT support consultant, you will agree that effective computer management across all networks is crucial. Implementing an efficient computer management solution ensures that your clients/corporate users enjoy maximum protection against malware, optimise their IT infrastructure and reduce their costs. It also enables you to provide the best possible support experience to end users wherever they are.

    Read More  

  • The harsh realities of free online backup

    The harsh realities of free online backup

    In the world of new cloud-based services so much is offered for free. Obviously, companies who are offering services for free are ultimately expecting to make money in some way from their services. Unfortunately nothing in this world is without some form of cost attached.

    Read More  

  • Using web filtering software to protect your business data.

    Using web filtering software to protect your business data.

    Why is the internet a dangerous place for your entrepreneurial / SME businesses? The answer to this was quite well put by a recent article by Entrepreneur. The article mentions several reasons why your computers, network and the data that resides on them are at greater risk now than ever before.

    Read More  

  • The cost of data recovery services

    The cost of data recovery services

    We now live in a knowledge economy. Your business data is mostly digital, and as your business grows, this digital data grows exponentially. As the data grows, so too does the value of the data to the well-being of your business. The need to protect this data is absolute.

    Read More  

  • Why is USB data recovery similar to a game of Russian roulette?

    Why is USB data recovery similar to a game of Russian roulette?

    It's common practice, right? Slip a USB drive into your PC or laptop and copy critical data from your hard drive. Then, put the USB drive in your pocket before leaving the office. Voila! Your data backup is done for the day.

    Read More  

  • Social networks in South Africa pose a serious threat to businesses

    Social networks in South Africa pose a serious threat to businesses

    Question: What's the biggest productivity killer in businesses today?

    Answer: Facebook, Twitter, LinkedIn and other social networks in South Africa.

    Question: What's one of the easiest ways for hackers to gain access to your confidential data?

    Read More  

  • Disaster recovery plan: What will you do when the lights go out? [infographic]

    Disaster recovery plan: What will you do when the lights go out? [infographic]

    The real question is, are you going to have your organisation running around like a headless chicken or do you have a plan in place for when a disaster strikes?

    Most small- and medium-sized businesses do not have proper disaster recovery or business continuity plans in place.

    Read More  

  • Cloud backup isn't just for your financial data

    Cloud backup isn't just for your financial data

    Cloud backup should be a critical part of your business continuity plan. This is because when a disaster affects your business, your cloud backup service can be the main method of recovering of all of your services and historic data.

    A lot of our customers only use cloud backup to back up their financial database. This is great, but what about all of your other data?

    Read More  

  • Why you need effective internet security software

    Why you need effective internet security software

    It's a fact of modern life: transacting over the internet has become part of the fabric of our very existence and how we transact and interact. My partner and I were recently discussing how we would go about defining a business continuity plan that would ensure total recovery in the event of a business disaster.

    Read More  

  • Here's how online storage can turbocharge your franchise

    Here's how online storage can turbocharge your franchise

    Franchise businesses are highly complex organisms in that there are different parties involved in making them a success.

    One of these parties is the entity who started the franchise; the franchisor. The franchisor is typically an entrepreneurial person or persons who have taken an initially small business, made it successful and then seen the benefits of branding and standardization, enabling them to create a franchise that is available in numerous locations.

    Read More  

  • Use IT asset management to identify clients at risk due to XP discontinuation

    Use IT asset management to identify clients at risk due to XP discontinuation

    By now you're probably well aware that Microsoft has officially 'said goodbye' to Windows XP - for more about the implications of this, read this article. Like all software and hardware assets across your client base, it's really advantageous (some would say vital) to have a consistently up-to-date view of all of these assets that exist at all of your clients.

    Read More  

  • Your business depends on you knowing how to recover corrupted files

    Your business depends on you knowing how to recover corrupted files

    We exist in a digital world that enables instant gratification in the form of immediate and constantly up-to-date corporate data reports and allied business intelligence. The flipside of this is that we are completely reliant on our data; business operations cannot continue if critical data is lost, corrupted or otherwise inaccessible. Data protection is thus a critical element of business continuity.

    Read More  

  • Do you make these common financial data security mistakes?

    Do you make these common financial data security mistakes?

    In the last few years our world has changed in so many different ways. With the high level of connectivity we now enjoy and all the good that it brings, we have gained hugely as business people in our ability to run and grow our businesses.

    Read More  

  • Should you block websites in the work place?

    Should you block websites in the work place?

    What happens in an internet minute? According to Intel, the statistics are staggering - check out a handy infographic here. Here are just a few mind-boggling statistics: every minute 100+ new LinkedIn accounts are created, Facebook is logged into 277,000 times, YouTube gets 1.3 million video views and 320+ new Twitter accounts are created.

    Read More  

  • Seven reasons why cloud antivirus is the best antivirus software

    Seven reasons why cloud antivirus is the best antivirus software

    It's an amazing world that we find ourselves living in. Apart from anything else, there's so much 'free' stuff that one can download and use for business purposes. For example, there are multiple 'free' antivirus applications available. Why would anyone spend actual, hard-earned money to purchase a solution that can be downloaded and used indefinitely for free?

    Read More  

  • Disaster recovery growth is set to grow cloud backup in South Africa for ISPs

    Disaster recovery growth is set to grow cloud backup in South Africa for ISPs

    Internet service providers (ISPs) are the gateway to the internet for many small and medium enterprises (SMEs). The biggest revenue generator for an ISP is the selling and managing of internet connectivity for their customers. In many cases these customers are small businesses, home businesses and consumers.

    Read More  

  • How can PC remote tools help increase sales of new computers?

    How can PC remote tools help increase sales of new computers?

    You and your customers should all by now be aware of the fact that Microsoft support for Windows XP ends as of April 8th this year. Yes, that's next month. What does this mean?

    nt base? For more about cloud-hosted remote support tools, download our white paper 'How to make your business more flexible and cost effective here.

    Read More  

  • Online backup in South Africa vs the international cloud

    Online backup in South Africa vs the international cloud

    How safe do you want your data to be? How accountable do you want your service providers to be to you? In which global location is your backed up data being kept? Does it bother you? The answers to these questions are very important.

     

    Read More  

  • Could an email scam destroy your company or steal your identity?

    Could an email scam destroy your company or steal your identity?

    Is your corporate email security policy sufficient or is your company network and confidential data exposed to cyber-attacks?

     

    Read More  

  • Should you invest in a spam filter solution?

    Should you invest in a spam filter solution?

    Do you see spam mail as nothing more than an irritating inconvenience that can be ignored or merely deleted? If you're running a business with multiple connected computing devices and associated users, then think again! Spam manifests in various forms and can have extremely destructive consequences for your business.

    Read More  

  • Take the Cloud Storage Quiz to find out whether your data is safe

    Take the Cloud Storage Quiz to find out whether your data is safe

    Have a quick look at this quiz to see whether your business data is safe:

     

    Read More  

  • Why we love online backups (and why you should too!)

    Why we love online backups (and why you should too!)

    IronTree opened its doors seven years ago as an online backup company. While our business may seem banal and boring, it's actually a fun, rewarding and interesting business to be in.

     

    Read More  

  • Is your computer security policy really keeping your data safe?

    Is your computer security policy really keeping your data safe?

    It's probably safe to say that the vast majority of businesses have some form of computer security in place. It's probably also a safe bet to say that most companies' computer security policy is limited to an anti-virus and anti-malware solution, perhaps allied with a firewall that's been configured to filter out spam as far as possible.

     

    Read More  

  • Why data protection is a vital part of your business continuity plan

    Why data protection is a vital part of your business continuity plan

    The Draft Information Security Policies as presented by The Department of Public Service and Administration states the following:

    "Backup of the organisation's data files and the ability to recover such data is a top priority.

    Managements are responsible for ensuring that the frequency of such backup operations and the procedures for recovery meet the needs of the State."

     

    Read More  

  • Six things to consider when evaluating PC remote tools

    Six things to consider when evaluating PC remote tools

    By now you've heard the term 'the cloud'. It's a global hot topic - the term that's on everyone's lips, the 'new' way to describe the internet and the fantastic facilities that are available to us. One of the biggest advantages of the cloud is that it gives us the ability to work and interact remotely; no matter where we are or what time it is.

     

    Read More  

  • Why hard drive repair software is not a sustainable solution

    Why hard drive repair software is not a sustainable solution

    Did you close the stable door after the horse had bolted? Is hindsight 20/20 vision? Do you wish you had backed up your data before disaster hit?

     

    Read More  

  • FAQ: cloud backup

    FAQ: cloud backup

    Cloud backup is also known as online backup. With the term 'cloud' being used more and more to define services and storage hosted on remote servers that could be located anywhere, the term cloud backup is coming to the fore.

    Read More  

  • Six business antivirus myths

    Six business antivirus myths

    One of the quirks of human nature is that when it comes to disasters, we tend to believe that 'it'll never happen to me'. Does this sound familiar to you?

    Read More  

  • Why disaster recovery is a huge potential market for ISPs

    Why disaster recovery is a huge potential market for ISPs

    Internet Service Providers are in a unique position to offer their clients disaster recovery solutions that cover a broad area of disaster recovery.

    Read More