Blog / News

Does the CIA have access to your router?

June 27th, 2017
Does the CIA have access to your router?

There are an exhausting number of cyber security threats to watch out for, and unfortunately you need to add another to the list. A recent leak from the CIA proves that routers are one of the weakest links in network security.

The Wikileaks CIA documents

For several months, the notorious website famous for leaking government data has been rolling out information it obtained from the Central Intelligence Agency.

Apple focuses on enterprise users with iOS 11

June 26th, 2017
Apple focuses on enterprise users with iOS 11

Businesses were quick to adopt Apple’s iPad in the workplace since its release in 2010. It didn’t take long for it to become one of the most popular Apple devices, even though many users regarded it as just an oversized iPhone. All that changed with the release of the iPad Pro, which Apple is positioning as a practical replacement for the PC or Mac.

Want to Cry? 7 IT security risks businesses cannot ignore

June 23rd, 2017
Want to Cry? 7 IT security risks businesses cannot ignore

Cybersecurity threats are often associated with larger corporates and multinationals. But the truth is that – as with the recent WannaCry ransomware virus – businesses of any size are at risk.

Unfortunately, many small and mid-sized businesses (SMBs) don't take the threat seriously, or they don't have the resources to manage them.

Ransomware does not have to succeed

June 23rd, 2017
Ransomware does not have to succeed

WannaCry ransomware made global headlines recently as it infiltrated thousands of SMBs as well as larger operations like telcos, schools and hospitals, including some large-scale victims like the UK’s National Health Service.

Be assured, this is not the first ransomware infection of its kind, and it won’t be the last.

Get more out of Office 365 with Power BI

June 23rd, 2017
Get more out of Office 365 with Power BI

The benefits of Office 365 have totally changed the way most businesses operate, and it’s hard to believe anything else could have been added to make it even better. But lo and behold, Microsoft has added another excellent feature for getting a better return on your productivity software investment.

Keep the Cloud affordable with these tips

June 22nd, 2017
Keep the Cloud affordable with these tips

Despite the Cloud being a powerful and cost-effective solution that many small- and medium-sized businesses welcome with open arms, there are hidden costs that some business owners might not be aware of. It might cost you little at first, but it has the potential to snowball and cost more than your weight in gold.

How a UPS protects your business

June 21st, 2017
How a UPS protects your business

Nature’s unpredictability guarantees that your business will experience several power outages that will affect your operations. An Uninterruptible Power Supply (UPS) ensures your computers and other devices never break down from power failure. More importantly, it ensures you never lose data from unexpected computer shutdowns.

Mobile security threats in Android

June 20th, 2017
Mobile security threats in Android

Employees today are working under tight timelines, but thanks to bring your own device policies (BYOD), they can access critical files and applications using their mobile device and get work done from anywhere. But BYOD can be a double-edged sword to those not vigilant about cyber attacks.

Gmail gets anti-phishing enhancements

June 19th, 2017
Gmail gets anti-phishing enhancements

Although hackers continue to develop new viruses and bug exploits, the most effective weapon in their arsenal is a simple email. All a would-be cybercriminal has to do is write a convincing message (or pretend to be a trustworthy entity) to persuade a victim to download a malware-ridden file or surrender their personal information.

Setting the record straight on containers

June 16th, 2017
Setting the record straight on containers

Virtualization technology and container technology are confusing topics in their own right, and comparing and contrasting them is even harder. Before you can really get into the weeds about how containers differ from virtualization, it’s best to clear up some of the misleading information surrounding how the two technologies work.