Blog

IT security predictions for 2016

Online security has probably never been such a hotly debated subject as it was in 2015. From recent numerous high-profile attacks on Sony and others, to this year’s leaking of data stolen from the extramarital-affair-facilitating website Ashley Madison website, have pushed cyber security firmly into the spotlight. So what can we expect from 2016? Experts […]

How big data can increase your profit

One of the biggest, buzziest phrases making the rounds in corporate circles at the moment is “big data”. But what does big data actually mean? What is it and, more importantly, what can it do for your business or organization? The good news is that it’s not just another tired old buzz word that actually […]

How data adds value to your business

We all know that data is valuable. After all, the more we know about the inner workings of our business and how our customers behave, the better. But knowing that data is crucial in helping to move your organization forward, and knowing exactly how to use that information to do so are two very different […]

Business interruption insurance 101

While it is highly likely that you have an insurance policy that will cover your small or medium-sized business in the event of a disaster, chances are you don’t have business interruption insurance. The majority of smaller companies tend to overlook interruption policies, believing (or at least hoping) that regular insurance will be enough to […]

Twitter warns about cyber attacks

Earlier this month, social media platform Twitter alerted a number of its users to the fact that their accounts may have been hacked into by something, or someone, known as a “state-sponsored actor.” While a warning of this kind is certainly not unprecedented – for some time now, both Facebook and Google have also been […]

Google and the art of safe mobile browsing

With the vast majority of end users turning to Google as their search engine or default browser of choice, it comes as no surprise to learn that the company takes security seriously. But in a perpetually changing landscape where anti-virus and anti-malware tools are constantly chasing their tails in order to stay up to date […]

Don’t download that health app just yet

Mobile health applications have been growing in popularity but this doesn’t necessarily mean their effectiveness is improving. In fact, doctors have called for greater oversight and regulation when it comes to health apps as many have never been truly tested. A number of these apps also make false claims about benefits in order to get […]

When should you invoke your BCP?

A Business Continuity Plan (BCP) is a valuable security blanket for countless companies across the nation. And while business owners hope they never have to invoke their continuity plan, it is important to understand which events might necessitate it coming into action. By understanding how certain disasters can impact your business, you’ll have a better […]

Don’t virtualize without answers

For small or medium-sized business, getting a leg up on the competition can be the difference between simply surviving and thriving. One way of doing this is by embracing virtualization. Many SMBs have used virtualization techniques to great effect, but implementing a change can be difficult and time-consuming. Here are a few questions you should […]

Cyber thieves love the holidays

Cyber thieves love the holidays

They know how busy people are and they count on people reacting to things in their email that might normally make sense this time of the year. Here are 12 techniques / suspicious emails to watch out for to protect both your business and home computing devices:

Secret Santa messages – chances are, you don’t have a secret internet Santa, so don’t click the link to find out who it is or what they got for you.