fbpx

Uncategorized

Do you know what is running on your network?

We all know that Windows XP and Windows 7 are now a security risk to your networks, but are you 100% confident there is still not a machine lurking on your network running these unsupported operating systems? The same...

Resurgence in webcam scam fooling “work from home” staff

A clever online scam that has been around for years has seen a resurgence in the last few weeks – because everyone is using their webcams more. The so-called “sextortion” scam fools staff into thinking they’ve been filme...

The Biggest Cloud Advances in the Last Decade

2019 saw the end to yet another decade in technology.  As we are entering the second generation of the “Roarin’ 20s,” it feels like the perfect time to look back on the ‘10s.  Even though cloud technology was widely avai...

Re-opening and the “New Normal”

Signs of hope are emerging across the globe as economies slowly begin to reopen, but the sad reality is there will never be a return to the “old normal.”  Re-opening phases will look different to each industry and busine...

5 Difficult Questions to ask an IT Support Company

Loads of businesses decided during lockdown that it was time to move to a new IT support company. Because of the way they were treated when lockdown happened, and while they were working from home. Now those businesses ...

The latest security snafu: Zoom

With everyone now working from home and finding new ways to collaborate and get things done, Zoom has become one of the most popular video conferencing applications, reporting growth of 378% over just one year ago. And a...

Is your business ready for the end of the traditional phone line?

The phrase, “Mr. Watson – come here.  I want to see you,” uttered by Alexander Graham Bell in 1876 was the phrase literally heard around the world.  With this statement, the “plain old telephone system,” or “POTS” ...

10 Most Important CyberAttacks of the last Decade

Did you know? 230,000 malware samples are created every day by hackers 60% of small businesses ultimately fail as a result of cyberattacks Over 3 million cryptojacking attempts were discovered between January and May 20...

How to set up and maintain a secure, remote work environment to overcome the COVID19 pandemic

We are in this together. We can’t say that enough. It’s not you, and I, but US. Information technology and communications providers, amongst many others are considered essential services in this unprecedented time, and w...

Is your current IT Support Provider secure?

This seems like a rather odd question to ask, doesn’t it? But how much do you really trust your current IT Support Provider with your business systems? With recent reports of IT Support Providers being attacked and makin...