IT versus Business Productivity

IT versus Business Productivity

Be honest with yourself. How much time and productivity did you and your business lose on computer or technology problems over the last 12 months? It would be relatively safe to bet on the fact that even routine maintenance had a bigger impact than you planned....
5 Reasons Your Business Is Ready for Professional Network

5 Reasons Your Business Is Ready for Professional Network

Your business has grown and you have been adding new team members and computers along the way. Now that you are sure everything is on track to succeed, perhaps its time to level up your network, to something more robust and scalable. Why? Here are top 5 reasons to...
What is the Cloud

What is the Cloud

There has been a lot of talk about the Cloud and Cloud Computing has been the buzzword for quite some time. But what actually is the cloud? Do you understand it? Do you use it? Should you? Should your business? At its core, Cloud Computing is about storing and...
Could Your Business Survive a Disaster?

Could Your Business Survive a Disaster?

With the increasing threats of fires, freak thunderstorms and cyber terrorism echoing for a number of years, it is certainly not a case of “IF” a disaster will strike your business, but rather, its a question of “WHEN”. When that happens, is...
How to Stop Your Business Becoming a Victim of Social Engineering

How to Stop Your Business Becoming a Victim of Social Engineering

Defense in depth. Layered Security. These are common terms touted in Cyber and Information Systems Security. While one can deploy the most technologically advanced security feature, one cannot ignore the importance of the human element. Your users, your staff, your...
Keep Up-To-Date By Outsourcing

Keep Up-To-Date By Outsourcing

Updating your business software is one of your best protections against IT Security breaches and cyber-attacks, but actually going through and running the updates is a task that often gets overlooked. Either they take too long, they pop up at inconvenient times, or...
Protecting Your Customer Data – The Basics

Protecting Your Customer Data – The Basics

As cyber-attacks continue to make headlines and unlawful access to customer data rises, one might think that it must be a daunting task to minimize these risks and exposure. However, like with any threat, it is important to get the basics right. Here are some simple...
Firewalls – Purchase and Deploy – But is it enough?

Firewalls – Purchase and Deploy – But is it enough?

Firewalls are a well-known security essential and recently, business owners have been catching on as big fans. But did you know that a firewall alone is not enough to keep your business safe? Imagine the scenario of building a fence around your house to keep out...
Meltdown and Spectre – What is it in simple terms!

Meltdown and Spectre – What is it in simple terms!

The recent discoveries of new vulnerabilities on the computer chips that power most of our computers have left practitioners scrambling to come up with solutions. Unfortunately, as these vulnerabilities occur at the chip (hardware) level, these are more difficult to...
The KRACK WiFi Vulnerability: How to stay safe

The KRACK WiFi Vulnerability: How to stay safe

An open source report has confirmed a vulnerability in the WPA2 protocol, which is used to secure most modern WiFi networks. This vulnerability has been named “Key Reinstallation Attacks” or KRACK . Without going into the technical details as how the...