Be honest with yourself. How much time and productivity did you and your business lose on computer or technology problems over the last 12 months? It would be relatively safe to bet on the fact that even routine maintenance had a bigger impact than you planned....
Your business has grown and you have been adding new team members and computers along the way. Now that you are sure everything is on track to succeed, perhaps its time to level up your network, to something more robust and scalable. Why? Here are top 5 reasons to...
There has been a lot of talk about the Cloud and Cloud Computing has been the buzzword for quite some time. But what actually is the cloud? Do you understand it? Do you use it? Should you? Should your business? At its core, Cloud Computing is about storing and...
With the increasing threats of fires, freak thunderstorms and cyber terrorism echoing for a number of years, it is certainly not a case of “IF” a disaster will strike your business, but rather, its a question of “WHEN”. When that happens, is...
Defense in depth. Layered Security. These are common terms touted in Cyber and Information Systems Security. While one can deploy the most technologically advanced security feature, one cannot ignore the importance of the human element. Your users, your staff, your...
Updating your business software is one of your best protections against IT Security breaches and cyber-attacks, but actually going through and running the updates is a task that often gets overlooked. Either they take too long, they pop up at inconvenient times, or...
As cyber-attacks continue to make headlines and unlawful access to customer data rises, one might think that it must be a daunting task to minimize these risks and exposure. However, like with any threat, it is important to get the basics right. Here are some simple...
Firewalls are a well-known security essential and recently, business owners have been catching on as big fans. But did you know that a firewall alone is not enough to keep your business safe? Imagine the scenario of building a fence around your house to keep out...
The recent discoveries of new vulnerabilities on the computer chips that power most of our computers have left practitioners scrambling to come up with solutions. Unfortunately, as these vulnerabilities occur at the chip (hardware) level, these are more difficult to...
An open source report has confirmed a vulnerability in the WPA2 protocol, which is used to secure most modern WiFi networks. This vulnerability has been named “Key Reinstallation Attacks” or KRACK . Without going into the technical details as how the...