Does your firewall really work? Something that your IT people may not be telling you, or they simply may not know, is the very real fact that for many SME businesses, firewalls are not the trusted enforcer they once were. Not all firewalls are created equal and if you haven’t looked at this portion
Blog
Combating the rise of cyber extortion
Ransomware continues to be a vicious worldwide cyber threat, and with new strains created every day, there are no signs it will slow down. The potential to fall victim to cyber extortion is high, with no business, industry, device, or operating system safe from ransomware. The good news is everyone can be prepared for
Tech trends Small and Medium size businesses need to be aware of in 2018
Tech trends Small and Medium size businesses need to be aware of in 2018 At this time of year, the heading reflects the most common question I’m asked by small and medium business owners (SME) – and rightly so for a SME. Being aware of technology advancements could help your business realise 2018 as your
Why updating your server could fix a lot of problems
Why updating your server could fix a lot of problems You’ve probably heard your IT Provider advise you that your server should be replaced every 3-5 years, which seems pretty frequent, right? But trust us, there’s a method to this madness. Did you know that the cost of server support increases on an average of
What is Phishing?
Phishing is a way for hackers to gain protected information, tricking people into giving away bank credentials, social security numbers, passwords, and more. That’s why phishing emails are considered a main vehicle for identity theft. They look legitimate, and most people don’t realize it’s a scam until it’s too late. Phishing can be categorized in
How to strengthen the weak links in your IT security
How to strengthen the weak links in your IT security“ Shadow IT is the term used to describe IT systems that are built and used within businesses without explicit business approval. An example is an individual employee signing up for a cloud-based app without going through an approval process first. Why is this a problem?
The 4 main benefits of IT outsourcing
Subscriber, “The 4 Main Benefits of IT Outsourcing” The number of SME business owners opting for outsourced IT services continues to show a dramatic increase in number, not only because it reduces headaches for them, but also because of the monstrous increase in cyber security threats within this year alone. Unless you’re an IT specialist
The Benefits of Virtualisation in 2017
The relationship between computer hardware and software can be frustrating. Both require the other to function properly, but both also require individual attention. Virtualisation makes this relationship far more flexible, and we’ve got a rundown on a few of the best examples. More technology uptime Virtualisation vendors use lots of fancy names for the features
The five red flags that show you’re spending too much on IT
The world of IT is developing at a rapid pace. It can be difficult for CFOs and business owners to know if they’re spending the right amount on their tech or if they’re being taken for a ride. In this article, we’ll highlight not only how to ensure that you’re not overspending on your IT,
Fight Cybercrime – How to help fix the issue, that 80% of all data breaches are a result of human error
Companies of all sizes are being hit by cyber-criminals and their data is being held for ransom. I talk with company owners and IT people everyday who say ‘it won’t happen to me’. Unfortunately the chances of being hit are dramatically increasing every day (I’m not a betting man facts are facts). Why is this