Could your company survive a
In today’s market, data is every businesses most important asset and it is now more vital than ever to ensure it’s protected from technical failure, fire, flood, theft, or even staff error. Databax are here to ensure your company would survive.
Two thirds of company’s go out of business within 6 months of a data disaster and 43% of all cyber-attacks are specifically targeted at small businesses. With all businesses now relying on their IT infrastructure to exist, what would you do if an office fire claimed all of your physical devices? If a Ransomware attack took hold of your data? Data protection is usually seen as low priority until a business is compromised, but with 50% of small businesses being breached in some way in the last 12 months, how ready is your company for a fatal data disaster?
Why Back-Up Your Data with Databax?
Databax’s Cloud Back-Up automatically runs nightly, ensuring that your data is up to date and secure, without reliance on human intervention.
Multiple levels of redundancy in our Data Centre ensures that whatever happens your data is safe and accessible at all times.
Enjoy immediate savings on your backup solutions, we have very competitive pricing available for all of your data requirements, from 1Gb to 100TB.
As your data is stored offsite in our tier 3+ Data Centre, your company’s information is always secure and always available.
Full end-to-end AES 256bit Encryption for both backup and restore, means that your data cannot be seen by anyone else, so data protection compliance is maintained.
Try for Free today
30 day free trial of the Databax Back-up Solution
Databax Unveils Re-Branding
The Databax Team are excited to show off our freshly rebranded vans to coincide with the launch of our brand new website. The bright and vibrant design echoes the style of the website and shows off Databax’s cool new branding proudly.
As you can see our techies love it, what do you think?
Mr & Mrs Muckley!
It’s been an exciting weekend for the Databax team as we watched our Operations Manager, John Muckley tie the knot to his beautiful bride Danielle.
The General Data Protection Regulation Is your business ready?
On 25th May 2018 the General Data Protection Regulation will come into effect and all business’s trading with or in the European Union will have to be compliant. Although many of the concepts under the current Data Protection Directive will remain the same, there are some key changes that company’s need to be prepared for to avoid fines in future. Encrypting data can satisfy many requirements of the GDPR, for Databax – DESlock Encryption by ESET is the best way to safely encrypt your data and secure your hard drives, removable media, files and email.
Why encrypt your data?
Data is a critical part of all businesses and is now their most valuable asset. Although the current regulation does not require businesses to encrypt data, the seventh data protection principle requires company’s to take appropriate measures to ensure any personal data they hold secure. Due to the low cost of encryption and its accessibility, if data is not encrypted and a breach occurs, the ICO takes the view that the data was not appropriately secured and regulatory action will follow.
Encryption is now becoming so vital for businesses as from 25th May 2018, The General Data Protection Regulation (GDPR) will come into effect, replacing the current EU data protection law, the Data Protection Directive. The aim of the GDPR is to update the regulation and unify the EU under one harmonised law. Currently, as there are 28 member states within the European Union, companies encounter difficulties ensuring they are compliant with a patchwork-quilt continent of approaches to the directive.
- One continent, one law – a single European law for all 28 member states.
- Stronger enforcement of the rules – Data Protection authorities will be able to fine companies who don’t comply up to 4% of their global annual turnover or €10 million, whichever is higher
- The right to know when data has been hacked – organisations must notify the national supervisory authority of data breaches and communicate to the data subject as soon as possible
- Notification of data breaches – the National Authority must be notified of data breaches as soon as possible, any notification beyone 72 hours after the incident must be accompanied by justification for the delay
- Data protection by design and default – data protection safeguards must be built into products and services from the earliest stage of development
- No exceptions – If non EU companies are active in the EU market, even if they’re goods & services offered are free, the same law and regulations still apply
DESlock Encryption by ESET
With the GDPR coming into effect next year, businesses are being advised to take action now to secure their data and ensure they are compliant in order avoid fines under the new regulations. As encryption is the easiest and safest way to secure data, Databax use DESLock encryption, secure in the knowledge that both our own and our customers data is encrypted and another layer of security is added to our systems. DESLock is a simple and easy to use encryption application and is a cost effective way to prevent data breaches for all sizes of organisation.
Secure data across all devices, wherever you are
Whether on the move, in the office or at home, DESlock encryption ensures your data is secured. DESlock encryption includes file, folder, full disk & removable media encryption
Secure transfer of data across locations
DESlock includes clipboard, attachment and removable media encryption, securing data across all mail clients and data stored on CD or DVD.
Secure data through controlled access
DESlock encrypts data and management are able to distribute keys to certain data when required. Similarly keys can be withdrawn and access blocked at any time.
Secure safe storage of personal data
DESlock is FIPS-140-2 validated and uses reliable, approved and secure industry standard encryption algorithms.
Secure destruction of redundant data
DESlock’s Shredder Tool securely deletes data to the DoD-5220.22-M standard, ensuring its completely unrecoverable.
Despite the UK opting to leave the European Union, the implementation of the GDPR on UK businesses will not change, and all organisations must be compliant. All it takes for your company to be in breach of the regulations is one USB stick to go missing. If any device containing personal data is lost, hacked, stolen or missing, the ICO must be notified within 72 hours, the credibility of the business is destroyed and a fine of up to €10,000,000 will follow.
Could your company survive?
Encrypt your data today and secure your business’s future.
Call 0161 660 4160
How secure is your network?
82 seconds, that’s how long it takes for a person in your organisation to click onto a phishing scam that has dropped into their inbox and for a company’s network to be compromised. 95% of all cyber-crime begins with an email, so how sure are you that your networks armoury is prepared to defend your business against the diverse and constantly evolving world of cyber-crime?
For Databax, that’s where Mimecast TTP steps in. Email is the simplest and cheapest way for criminals to compromise your network and of all the scams that are dropping into users’ inboxes 23% of recipients will open the email and 11% will run the attachment, how would you tackle this?
Mimecast Targeted Threat Protection is an advanced security package, which offers a comprehensive security suite to help companies protect themselves against malicious email attacks.
Mimecast TTP protects against
So what are the benefits?
Real time scanning of all inbound emails
As emails pass through the Mimecast gateway, all components of the message are scanned including the display name, domain name & age and the body of the message. The company’s administrator has the control to decide what to do with emails that fail a combination of these tests – they can be blocked or held and marked as suspicious for the user to determine whether the email is safe or not.
Sandboxing of File Attachments
Businesses can block certain types of attachments that are sent and received, however, documents such as Microsoft Word, Microsoft Excel and PDF’s are all legitimate documents colleagues would need to send to each other, and are easily weaponised. Attachments that could contain malicious code are removed from inbound emails and replaced with a transcribed, safe copy. If users deem the attachment as safe, they can request for the original document.
Protection from Malicious URL’s
Any links sent via email are sent through the Mimecast gateway and URL Protect rewrites all URL’s in every email. If URL’s are clicked Mimecast scans the site and if seen as malicious the site is blocked, all others deemed as safe become accessible immediately.
Protection on & off corporate network
All features of Mimecast TTP – URL Protect, Attachment Protect and Impersonation Protect, are featured for all inbound emails for a business, meaning whether a user is accessing their email from their office, their smartphone or their own computer at home, every click, everywhere, across all devices used is secured.
Increased User Awareness
In addition to Mimecast TTP’s security, another layer which is improved through using Mimecast, is User Awareness. Users are prompted to review and either accept or deny links or attachments in emails which Mimecast have deemed as suspicious. Moreover, the company’s administrator is able to review users’ activity – so if certain users are repeat offenders for clicking on malicious links and attachments, they are prompted more frequently to review emails until their awareness improves. This helps to build a ‘Human Firewall’ and add extra security to the network by increasing all users’ awareness.
Get in touch & secure your network today
Once a malicious email has penetrated a network, it can stay undetected for 205 days, with the average data breach costing a UK company £1.2 million per incident and the recovery time estimated at around 2 months. Mimecast TTP offers a comprehensive set of security features to protect your network from malicious cyber attacks and with 95% of breaches coming through email how sure are you that your network is protected against them?