Why you need Email Gateway Security

Why you need Email Gateway Security.

The security industry has provided large businesses with effective email security solutions for many years, helping to address their heightened sensitivity to email risk.

Email gateway security solutions have proven particularly effective because they filter inbound and outbound email traffic at the email gateway, thus ensuring that only emails conforming to corporate policy are allowed in and out of the business. Because these solutions remove unwanted email before it reaches the email gateway, they also reduce bandwidth consumption over networks.

Mid-sized businesses historically have been less aggressive toward email security, due to lower perceived risk and a general lack of full-featured solutions suitable to their budgets and environments. Today, however, these companies face a constant barrage of spam, viruses, and other malware that can cause significant business harm—ranging from impaired productivity to lost business and brand damage.

News headlines frequently tout the proliferation of email-based spam and malware. In 2014, two-thirds of all email traffic was spam. For mid-sized businesses, spam and viruses have traditionally been a nuisance and productivity hindrance, so deploying anti-spam and antivirus solutions that could block most of this traffic was considered good enough….

Read More:



Six Data Security Techniques That Are Highly Valuable For Businesses.

Australian business owners need to recognize the importance of data security. IT companies are ready to assist business owners with all their data security needs. With the ever-growing threat of cyber-crime, it becomes more and more important to protect assets before they are compromised.

Everyone needs to be installing multiple layers of security and backing up files to the cloud and offline, there’s no excuse for data and company security to be compromised in today’s modern and highly reactive security environment.

Crime syndicates have moved into the cyber security realm. These hackers are extremely sophisticated and have the ability to hack your systems today. You also have to anticipate the threat from hacktivists, these are motivated individuals that attack companies for political agendas. One more common security threat to be aware of is corporate espionage and protecting data from disgruntled or opportunistic employees. The bad guys are arming themselves with the latest technologies to steal information, Don’t let them succeed!

Read More:



are you compliant with Customs Act 1901?

Are you Compliant with “Customs Act 1901” ?

This act mandates that all owners and importers of goods must retain records for 5 years and be able to produce records as required. Penalties apply should you not comply.

Are your records protected and archived for 5 years?

If you are not absolutely certain you must read on.

How to protect your records:

  1. Ensure that you have professional Anti-virus that is up to date
  2. Ensure that you have professional Web Protection
  3. Back up all of your files both on-site and to a cloud backup. This must be monitored to ensure that the backups are working as they should.
  4. Make sure your computer operating system is up to date and has the latest security patches installed.
  5. For extra protection or if you are a medium to large businesses you should also consider:
    1. Proper Gateway Firewalls
    2. Cloud based mail filtering
    3. Proper user permission management
    4. Staff education programs.

What are your risks of losing files / data?

From my experience, most files/data are lost through accidental deletion or deliberate deletion by a disgruntled employee. The second most common cause is hardware failures.

Other common causes include:

  • Power surges
  • Accidental data corruption
  • Acts of god. Floods etc.
  • Fire
  • Burglary / Theft of equipment
  • Encryption / Ransom-Ware viruses like the latest “WanaCry” attack
  • Other Viruses

Ransom-Ware is on the rise and becoming a more serious risk by the day. The latest “WanaCry” attack affected more than 200,000 computers in the first 3 days.

If you are not taking your security and backups seriously, it is only a matter of time before you will probably get affected.


Where to from here?

Talk to your IT provider and get them to prove to you that your data is safe. If they cannot do so, we recommend to talk to the guys at Plan A IT


History of Ransom-Ware & how it works

I just found this excellent video on YouTube that I thought I would share with you. It explains very well what Ransom-Ware actually does and how serious a threat it is.

The video was published September 2016 but has never been more relevant than today.

In the past year I have noticed that major vendors like Cisco, Kaspersky etc. are constantly focusing their seminars and webinars on this insidious threat. I take this to highlight the serious nature of this threat an so should you.

If you are not taking your IT Security seriously it is only a matter of time before you wish that you had done so.


Security… Why Do I need It?

We live in a world where everyone seems to believe that nothing bad will ever happen to them so they don’t have to take any steps to prevent the worst. Unfortunately, it is this kind of thinking that can make our job very difficult. Computer security is very important and let us show you why.

Picture this scenario, we get called out urgently to a business because a computer has crashed and they can’t access any of their data. We come out and look inside the computer only to realise that the hard drive is fried and there is no chance for recovery. We deliver the bad news but with the optimistic question – do you have a back-up? At this point the client’s day either gets better or much much worse. A yes answer means we just need to arrange a new computer and reinstall everything back onto it – the client’s downtime will be minimal. A no answer means we still arrange a new computer and get it setup but then they start the very slow process of hopefully being able to recreate everything they just lost. Unfortunately, this isn’t always possible especially if it is client history or contracts that have been lost, in many instances the business simply closes down.

We have seen this scenario far too many times which is why we now offer back-up solutions tailored to your needs. We want to ensure that your data will never be lost. Plan A takes a four-pronged approach. We ensure you have:

  • Managed Antivirus
  • Managed Web Security
  • Managed Onsite Backup and
  • Managed Cloud Backup

Basically, what this means is you will never lose your data again.

To learn more about the Plan A Security Suite and to request a quote go to



“Worst-Ever Recorded” Ransomware Attack Strikes Over 57,000 Users Worldwide, Using NSA-Leaked Tools

WannaCry Ransom-ware – Avast detects over 57,000 users affected

  • More than 70 countries targeted.
  • Major institutions infected, including hospitals.

According to experts tracking and analyzing the worm and its spread, this could be one of the worst-ever recorded attacks of its kind. The security researcher who tweets and blogs as MalwareTech told The Intercept “I’ve never seen anything like this with ransomware,” and “the last worm of this degree I can remember is Conficker.” Conficker was a notorious Windows worm first spotted in 2008; it went on to infect over nine million computers in nearly 200 countries. As The Intercept details

Security firm Kaspersky Lab has recorded more than 45,000 attacks in 74 countries in the past 10 hours. Seventy-four countries around the globe have been affected, with the number of victims still growing, according to Kaspersky Lab. According to Avast, over 57,000 attacks have been detected worldwide, the company said, adding that it “quickly escalated into a massive spreading.”

According to Avast, the ransomware has also targeted Russia, Ukraine and Taiwan. The virus is apparently the upgraded version of the ransomware that first appeared in February. Believed to be affecting only Windows operated computers, it changes the affected file extension names to “.WNCRY.” It then drops ransom notes to a user in a text file, demanding $300 worth of bitcoins to be paid to unlock the infected files within a certain period of time.

While the victim’s wallpaper is being changed, affected users also see a countdown timer to remind them of the limited time they have to pay the ransom. If they fail to pay, their data will be deleted, cybercriminals warn. According to the New York Times, citing security experts, the ransomware exploits a “vulnerability that was discovered and developed by the National Security Agency (NSA).” The hacking tool was leaked by a group calling itself the Shadow Brokers, the report said, adding, that it has been distributing the stolen NSA hacking tools online since last year.

Predictably, Edward Snowden – who has been warning about just such an eventuality – chimed in on Twitter, saying Whoa: @NSAGov decision to build attack tools targeting US software now threatens the lives of hospital patients.”

Don't be a victim. Click Here to for more information.