INSIGHTS - "THE UNKNOWN UNKNOWNS"

Articles

You’ve Been Hacked And Now You’re Being Sued!

Cybercrime is a continuing and rising threat. It has been in the news extensively and we have commented on the threats posed … Continue reading You’ve Been Hacked And Now You’re Being Sued!

What is your business risk from broadband outage?

Cybercrime has been in the news extensively and we have commented on the threats posed by Ransomware and DDoS attacks. However recent … Continue reading What is your business risk from broadband outage?

DDoS Attack – What is it? How To protect Yourself

Major portions of the internet were recently taken offline by a major cyber attack. Websites became inaccessible and internet users were unable … Continue reading DDoS Attack – What is it? How To protect Yourself

Why The Man With The Van Is Redundant

It is an inescapable reality that most businesses rely heavily on technology, and of the many challenges facing the small business owner … Continue reading Why The Man With The Van Is Redundant

How Do You Protect Your “Crown Jewels”?

We have worked with business owners and senior management of organizations with less that 200 staff for over 20 years. We continually … Continue reading How Do You Protect Your “Crown Jewels”?

Licensed to Waste Money?

Over the 20 or so years that we have worked with business owners and senior management of organizations with less that 200 … Continue reading Licensed to Waste Money?

How Do You Know You Can Recover Your Data?

In our work with business owners and senior management of organizations with less that 200 staff  we regularly come across the same, … Continue reading How Do You Know You Can Recover Your Data?

Is Your IT An Investment Or An Expense?

In the course of our work with business owners and senior management of organizations with less that 200 staff we see many … Continue reading Is Your IT An Investment Or An Expense?

Who Manages Your IT?

A recent study which investigated IT in SMEs quotes a senior manager of an accounting practice: “We have had trained IT staff … Continue reading Who Manages Your IT?

The True Cost Of “One-Off” IT Support

To many small business owners it may seem perfectly logical to bring in an IT support specialist as and when you have … Continue reading The True Cost Of “One-Off” IT Support

The Black Art of SPAM Prevention

Most organisations today categorise email as mission-critical to their business, and so the ability to reliably send and receive emails receives a … Continue reading The Black Art of SPAM Prevention

The Qualities Of A Trusted Advisor

There is a lot of talk in consulting circles about the need for IT services providers to move beyond being excellent technicians … Continue reading The Qualities Of A Trusted Advisor

60% Of Cyber Attacks Are On SMEs

Cyber crime has been in the news recently. A few months ago the UK press was awash with the lurid headlines of … Continue reading 60% Of Cyber Attacks Are On SMEs

The 8 Big Recurring IT Issues For SMEs

As a SME business specialist we have been providing outsourced IT support services to SMEs and growing businesses in APAC since 1996. … Continue reading The 8 Big Recurring IT Issues For SMEs

40% of Businesses Hit by Ransomware in the Last Year

Nearly 40 percent of businesses have experienced a ransomware attack in the last year, according to a new study. Scary results from … Continue reading 40% of Businesses Hit by Ransomware in the Last Year

Too Small to be Hacked? [Think you are not at risk?]

The Internet is a dangerous, anarchic place, and we always adopt what we believe to be appropriate and effective security precautions for … Continue reading Too Small to be Hacked? [Think you are not at risk?]

Is Windows Finally Secure?

We’ve all believed for so long that the Windows operating systems are full of security flaws: – but is this really the … Continue reading Is Windows Finally Secure?

Who can access your cloud data?

Somewhat unsurprisingly, The US Justice Department is insisting that Microsoft give them access to email data of a subscriber from Office365 servers … Continue reading Who can access your cloud data?

Facebook Down VITAL KEY Communications Disrupted

So we hear that our beloved Facebook had a little problem today and went offline for a whole 30 mins. The end of the … Continue reading Facebook Down VITAL KEY Communications Disrupted

Hacked Online

Barely three months after I first touched on this topic, we hear earlier this week that the Singapore Government’s SingPass access system to … Continue reading Hacked Online

In Cloud We Trust

Somewhere out there….   Everyone is talking about the ‘Cloud’ – which seems to be the greatest thing since sliced bread, and … Continue reading In Cloud We Trust

My Heart Bleeds

In early April 2014, news of the Heatbleed security vulnerability was announced to the world. This flaw affects the security of supposedly … Continue reading My Heart Bleeds

Should my next machine be a desktop or a notebook?

There is no clear reason to choose either desktop or notebook format. Rather, it depends on who will be using the machine … Continue reading Should my next machine be a desktop or a notebook?

Considering Backup

I’m asked many times about how and what is required for backup. There are many ways to approach this, and many solutions, … Continue reading Considering Backup

SSDs have come of Age

SSDs – or Solid State Drives (not SSDD!) – have finally reached a price point where it makes sense to consider replacing … Continue reading SSDs have come of Age

Are we ready for Windows 8?

A little over a year ago, Microsoft ‘blessed’ us with the latest and greatest incarnation of Windows. Many of us rushed out … Continue reading Are we ready for Windows 8?

© 2022 PASR Technologies Pte Ltd

Terms & ConditionsPrivacy Policy

Support

Support Hotlines

Email: support@pasr.net

+65 6340 1017 (Chat only)

  • Singapore

    9635 6482