Profile cover photo
Profile photo
5 Star Technology
10 followers
10 followers
About
Posts

Post has attachment
We will match common real life scenarios with IT scenarios so you can grasp the concept of layered security.

Post has attachment
Another article about network protection for business.
Although the main focus is on Ransomware, the takeaway should be on how to implement several strategies to minimize the risk of a breach.

http://www.5startechnology.com/2016/07/19/preventing-ransomware/

Post has attachment
Failing to put controls on employee web access causes multiple risks and cost problems:

http://www.5startechnology.com/2016/06/02/web-protection/

Post has attachment

Post has shared content

Post has attachment
The 3-2-1 rule is very general and it works for all data types (individual and corporate) and all environment types (physical and virtual).
This approach helps to answer two important questions: how many backup files should I have and where should I store them?

Post has attachment
Your I.T. consultant should be a consultant. That is, they should give you good advice that serves you well in the long run.

http://www.consultantoramateur.com/2016/02/beware-budget-bifurcation.html

Post has attachment

Post has attachment

Post has attachment
Here’s a compilation of security practices you should follow for safe computing on your pc. - See more at: http://www.5startechnology.com/2015/10/30/safe-computing/#sthash.L5ANq9gm.dpuf
Wait while more posts are being loaded