Insights and Updates

topics of interest delivered fast & to the point ...

IT Insights

Quick Guide to Virtualization as a DR plan

Quick Guide to Virtualization as a DR plan

Although many business owners think that Virtualization and Disaster Recovery (DR) are two separate services, the former can actually be used as a legitimate solution to the latter. Here’s how it works, along with some pointers to keep in mind should you choose virtualization as your disaster recovery plan. Unlike tape backups, Virtualization restores your […]

Don’t let a ghost take over your phone

Don’t let a ghost take over your phone

There are so many ways now to have our computers hacked, but we forget about our phones. We already know that we shouldn't leave our devices unattended without a password, and most of our phones now are fingerprint locked, but still, there are ways to compromise our phones.

New Office 365 cyberattack on the loose

New Office 365 cyberattack on the loose

Phishing scams disguise malicious links and emails as messages from trusted sources. The most recent scam to watch out for almost perfectly imitates a trusted invitation to collaborate through Microsoft SharePoint. It’s a three-step attack that’s easy to avoid if you know how it works. Step 1 – Invitation to collaborate email The first thing […]

4 Security risks of the BYOD strategy

4 Security risks of the BYOD strategy

Taking work home, or practically anywhere, has never been easier. The bring your own device (BYOD) strategy has become a popular approach for many businesses to conduct work more efficiently and flexibly. But this strategy is not without risks. BYOD, if not implemented correctly, can make your system susceptible to a number of attacks. Here […]

From IASME GOLD to ISO27001

From IASME GOLD to ISO27001

In the past six months, we have been working hard to improve our internal policies and procedures so that as we grow we can consistently deliver the same high-quality service to each and every one of our clients.
We are delighted to announce that we have successfully been certified against the IASME Governance Standard to GOLD level.

What you need to know about e-commerce & AI

What you need to know about e-commerce & AI

Many business owners are looking to artificial intelligence (AI, or “machine learning”) for its potential to improve communications with their customers. It is predicted that by 2020, 85% of all interactions will originate from machine learning “bots.” If you operate an e-commerce business and are wondering how you can benefit from bots, you’re in luck. […]

Why I don’t fear Cyber Crime

Why I don’t fear Cyber Crime

With all those news of people being scammed online, with criminals hacking computers and taking over systems, I need to know that my computer and all its data are secure and that every step has been taken to ensure this.

Everywhere I look there are references to cybercrime and hacking.

The pitfalls of business continuity planning

The pitfalls of business continuity planning

Your service provider, tasked with looking after your company’s IT, has kept your business up and running for the past 10 years. Unfortunately, that kind of longevity in developing continuity plans can result in some providers overlooking or underestimating certain issues. Here are some of them. Over-optimistic testing The initial testing attempt is usually the […]

Virtualization security risks & management

Virtualization security risks & management

While virtualization security is often viewed as an afterthought, it is nevertheless important. Like all technology, securing your virtualized infrastructure is vital to your business’s success. Let’s take a look at some of the security risks posed by virtualization and how you can manage them. Security risks of virtualization Complex infrastructure – Much like virtualization […]

Do you have a fax? Be sure it won’t get faxploited

Do you have a fax? Be sure it won’t get faxploited

It's funny that we take some pieces of technology for granted, we never think they could harm us and our businesses, but in the end, we find out that our ignorance harmed us.

This is the case with faxes, a bit antiquated, a machine everybody forgets about, but one that can be hacked and used against us and our business.