Finding The Right Balance of Security and Usability

Balancing security and usability

Every day there there is news about some new malware, data leak or company hack. Your business is vigilant, but it feels like you always have to be doing more about cybersecurity to remain protected. Meanwhile, you want to balance security measures with convenience, usability and cost. That balancing act puts you somewhere on the sliding scale of security. Continue reading

7 Tips To Prevent Mobile Malware

Mobile Device Security

Cybersecurity researchers uncovered that mobile malware attacks surged by 500% a the start of 2022. This is alarming both in scale and the fact that many people are not yet protecting their smartphones. Year after year, mobile phones have become more powerful and today can do many of the same functions as a computer – just with a much smaller screen. But people tend to secure their computers much better than they do with their smartphones and this needs to change as over 60% of digital fraud now occurs through mobile devices! This makes all mobile devices a high risk if proper safeguards are not followed. Continue reading

8 IT Checks to Make Before You Travel

Travelling with technology

Most of us won’t even travel to the end of the block without our phones and when we go on longer trips, we can end up take a lot a tech.  You can travel smarter and more securely by doing several checks before you go by using our handy tech travel checklist below. The checklist can save you from suffering from lost devices, missing chargers or even a data breach. Continue reading

Setting Up Your Work from Home Environment

Working from home

You have been told to stay put and work from home, but you may now be a bit confused as you look around your home. You have never set up a home office before and are thinking, “Hmm, work where?”. Here are some tips on getting you organised to go online and get things done remotely. Continue reading

Is Your Business Ready for the Coronavirus?

COVID-19 CoronaVirus

The Coronavirus (which is now being called COVID-19) is spreading and we will be feeling the effects for a while. As such, businesses should start to make preparations on how to handle things. Your first priority should be for the health of your employees and customers. Then you need to consider business continuity and prepare for mobile or remote working capabilities for you and your staff. Continue reading

Are You Protected Against Leakware?

Leakware or extortionware

You should have heard about ransomware by now. Cyber-criminals access and encrypt your data and you have to pay a “ransom” for the key to unlock your data. If you have a backup you can revert to that and forget about the hackers threats. Leakware (also known as extortionware) is similar, but now the bad actors are threatening to post your confidential information online if you don’t pay up. Continue reading