ActiveImage Business Continuity Blog

Australian Disaster Recovery News and Reviews 

What is a Blended Attack?

Blended attacks combine multiple threats into a single attack to leave a networked computer completely compromised. Normal cyber attacks tend to have only one attack vector, but blended attacks will use multi-pronged strikes to exploit any vulnerabilities. Security and IT personnel have a difficult time trying to deal with a blended attack as they hit […]

Read More
A man uses his phone while working on his laptop.

Do you have Backup and Recovery for Your Mobile?

Laptops, tablets, smartphones and any other mobile devices make everything possible from reading the news to working online while traveling. Thanks to smartphone technology, it has become easy for business people to work on the go, keep up to date with business affairs and access sensitive data no matter their location. Although highly beneficial for […]

Read More

4 Things to Avoid in Data Recovery

Knowing what not to do when creating and implementing your data recovery plan is just as important as knowing how to put together and maintain a correct and reliable procedure. Here is what to avoid when working with data recovery:   What to Avoid in Data Recovery   1. Don’t Underestimate Your Infrastructure Many organizations […]

Read More

2018’s Most Common Cyber Attacks

With the year drawing to a close and the holidays fast approaching, we take time to look back at the cyber attacks that dominated the world of cyber crime in 2018. By understanding the main tactics used by cyber criminals this year, we can predict and become more prepared for next year’s threats.   5 […]

Read More

Have You Been Hacked?

Sometimes technology doesn’t always work the way it used to and it could be starting to show its age, and signalling that it is time for a replacement. However, some signs that makes it look like your machine is malfunctioning can also be a sign that you have been hacked. Here are 6 things you […]

Read More

Deduplication: pros, cons, what to look for and what to expect from it.

  We will not try to get down to the molecular level. The main intention of this article is to shed some light on deduplication-relevant pros and cons and to broaden view of this topic. In computing, the simplest and the most effective definition (by Wikipedia) of Data Deduplication goes as “a specialized data compression […]

Read More
Scada BDR

ActiveImage in SCADA environment

SCADA (Supervisory Control And Data Acquisition) Systems control the automation in many industries such as Power, Water, Manufacturing, Energy, Mass Transit and more. SCADA systems are computer based, and so even the best system will fail at some point for reasons such as: Hardware Failures (disk failure, power surges, aged equipment, etc). Software Failures (viruses, […]

Read More

Everything You Need To Know About The Pen Test

Although you may have implemented the best cyber-crime defenses and have a great IT team, there can still be holes in the infrastructure that cyber-criminals can manipulate to get access to your valuable data. This is why businesses run a penetration (pen) test.   What is a Pen Test?   It is a test to […]

Read More

3 Basics Ways to Protect Your Small Business From Phishing

Phishing uses social engineering techniques in an attempt to convince a user to give up their private information. They gain access to usernames, passwords, credit card number and other sensitive information. Cybercriminals will pose as a legitimate person or company. Email may include links to a real website. These websites, companies and individuals are fake […]

Read More