Answering quizzes or surveys on social media may seem innocent, but the people behind those questions could have ill intent. They are using a quiz format to gather the personal information they need to access your accounts. Think about it. Who else asks for your pets’ names, your favourite colour, the school and / or university you attended, or your mother’s maiden name? These are questions you use as password reset prompts. Continue reading
A lot of people ask me about security and are often confused when I say you need multiple layers of security. This blog aims to explain the multiple layers and relates them to how you secure your own home or office. Continue reading
In a lot of these blog articles on security I always say you need to keep your software up to date. But what happens when that so called update is ransomware? This is the nightmare caused by an emerging cybersecurity threat called Big Head. Continue reading
It is often lax cybersecurity practices that enable cybercriminals to breach companies. This is especially true when it comes to SMBs (small and mid-sized businesses) as they often don’t prioritise cybersecurity measures. They may be just fully focused on growing the company and they think they have a lower data breach risk. Cybersecurity is not only a concern for large corporations and is a critical issue for small businesses as well. Small businesses are often seen as attractive targets for cybercriminals as they don’t spend the time to implement proper cyber security defensive methods. Continue reading
We are tend to ignore or put off issues that we don’t know about, think are too hard to fix or believe it won’t happen to me. Here are some of the most common cybersecurity issues faced by SMBs that that could leave your business in danger if left unchecked. Continue reading
Every day there there is news about some new malware, data leak or company hack. Your business is vigilant, but it feels like you always have to be doing more about cybersecurity to remain protected. Meanwhile, you want to balance security measures with convenience, usability and cost. That balancing act puts you somewhere on the sliding scale of security. Continue reading
Do you have a laptop? How you would feel if your laptop was lost or stolen. Maybe you looked away for a moment at the café or airport, or someone broke into your office, house or car. Continue reading
Are you constantly wondering if an email inbox is legitimate or a cunning phishing attempt? Continue reading
For a while now, technology has played a significant role in our lives. But as with most things, myths pop up and persist.
- Can I leave my smartphone charging overnight?
- Macs don’t get viruses?
- Browsing in incognito mode it totally anonymous.
- Your infrastructure is outdated.
- You experience frequent downtime.
- You can’t take advantage of new solutions on your systems.
- You can’t scale like you need.
- You struggle with data compliance.
- You can’t scale like you need.
It is easy to put off nagging tech problems. But the “little” IT issues you are avoiding could lead to big business problems later on.
View our straightforward infographic providing a quick idea of what to do about these common IT problems.