IT security predictions for 2016

Online security has probably never been such a hotly debated subject as it was in 2015. From recent numerous high-profile attacks on Sony and others, to this year’s leaking of data stolen from the extramarital-affair-facilitating website Ashley Madison website, have pushed cyber security firmly into the spotlight.

Read more

Make meetings productive with Do.com

Is there anything worse than an unproductive meeting? The feeling of those minutes and even hours slipping by you as you sit ‘brainstorming’ with co-workers, only to leave the room with a big fat nothing. The frustrating part is that, when run effectively, meetings can result in great ideas, and can add huge value to […]

Read more

Business interruption insurance 101

While it is highly likely that you have an insurance policy that will cover your small or medium-sized business in the event of a disaster, chances are you don’t have business interruption insurance. The majority of smaller companies tend to overlook interruption policies, believing (or at least hoping) that regular insurance will be enough to […]

Read more

Twitter warns about cyber attacks

Earlier this month, social media platform Twitter alerted a number of its users to the fact that their accounts may have been hacked into by something, or someone, known as a “state-sponsored actor.” While a warning of this kind is certainly not unprecedented – for some time now, both Facebook and Google have also been […]

Read more

Google and the art of safe mobile browsing

With the vast majority of end users turning to Google as their search engine or default browser of choice, it comes as no surprise to learn that the company takes security seriously. But in a perpetually changing landscape where anti-virus and anti-malware tools are constantly chasing their tails in order to stay up to date […]

Read more

Don’t download that health app just yet

Mobile health applications have been growing in popularity but this doesn’t necessarily mean their effectiveness is improving. In fact, doctors have called for greater oversight and regulation when it comes to health apps as many have never been truly tested.

Read more

When should you invoke your BCP?

A Business Continuity Plan (BCP) is a valuable security blanket for countless companies across the nation. And while business owners hope they never have to invoke their continuity plan, it is important to understand which events might necessitate it coming into action.

Read more

The keys to a successful Office 365 migration

Microsoft Office 365 is growing in popularity as more and more businesses make the move to the cloud. However, without proper planning and testing beforehand, you could get stuck in the middle of the migration process, end up with duplicated data, or even have to abort the transition completely.

Read more

Cortana tips to make your life easier

Wouldn’t it be grand if you could afford to hire your own personal assistant? Someone who could take care of menial tasks, sing songs to you, and generally just make your life more pleasant? As technology develops, we are getting closer and closer to virtual assistants who are just as good as their real-life counterparts.

Read more

Don’t virtualize without answers

For small or medium-sized business, getting a leg up on the competition can be the difference between simply surviving and thriving. One way of doing this is by embracing virtualization. Many SMBs have used virtualization techniques to great effect, but implementing a change can be difficult and time-consuming.

Read more