2701, 2016

The Importance of Disaster Recovery

By |January 27, 2016|Categories: Business Continuity|Tags: , , , , , , , , , , , , , , |

Most business owners don’t normally think they will be a victim of a natural disaster...not until an unforeseen crisis happens and their company ends up suffering from thousands or millions of dollars in economic and operational losses -- all because of the lack of thoughtful disaster preparedness. This post gives [...]

2501, 2016

Security tips for the small business

By |January 25, 2016|Categories: Security|Tags: , , , , , , , , |

It’s been said so many times that many small business owners are likely to block it out, but the truth remains: cyber criminals target SMBs. Perhaps the reason for this ignorance is that when an SMB falls victim to an online attack, it’s not breaking news. But this time, in [...]

1201, 2016

Privacy Protection through Browser Extensions

By |January 12, 2016|Categories: Browsers|Tags: , , , , , , , , |

Even if you’re not currently taking adequate steps to protect yourself (and your company!) when you’re using the Internet, deep down you know you should be. Or maybe you already think you have enough precautions in place – but can you ever be too careful? In these times of Internet [...]

501, 2016

Google Tests New Login Option

By |January 5, 2016|Categories: Web|Tags: , , , , , , , , |

It seems Google is taking the issue of online security increasingly serious as they have recently unveiled their latest attempt to stem the tide of phishing. Trialing a password-free login option, they also aim to curb the dangers caused by ineffective and over simplified passwords – something that every small [...]

2912, 2015

The curse of Chimera ransomware

By |December 29, 2015|Categories: Security|Tags: , , , , , , , , |

There are numerous strains of malware out there, but one particularly unpleasant one is ransomware. While this malicious software has been around for some time, recently a newer, nastier upgrade was discovered. Posing a threat to businesses of all sizes, the program, called Chimera, has upped the ante when it [...]

1812, 2015

Twitter warns about cyber attacks

By |December 18, 2015|Categories: Security|Tags: , , , , , , |

Earlier this month, social media platform Twitter alerted a number of its users to the fact that their accounts may have been hacked into by something, or someone, known as a “state-sponsored actor.” While a warning of this kind is certainly not unprecedented – for some time now, both Facebook [...]

1712, 2015

Google and the art of safe mobile browsing

By |December 17, 2015|Categories: Security|Tags: , , , , , , |

With the vast majority of end users turning to Google as their search engine or default browser of choice, it comes as no surprise to learn that the company takes security seriously. But in a perpetually changing landscape where anti-virus and anti-malware tools are constantly chasing their tails in order [...]

Go to Top