What is spear phishing?

Security_Feb17_COne of the most common threats to business and individual systems is phishing. This form of hacking is well known and many users have educated themselves on the more traditional methods used by hackers. This has forced hackers to come up with different phishing techniques, and one of the methods that is causing problems is spear phishing.

Read more...



Support for Windows XP to be Discontinued on April 8th

As you may be aware, support for Windows XP and Office 2003 will end on April 8, 2014. Having an unsupported operating system running on your network carries potential risks such as;

Read more...



Safeguarding your Android device

AndroidTab_Feb24_CYou don’t need advanced technological know-how to provide the best protection for your Android tablet. Our guide shows some simple ways you can safeguard your device from digital and physical threats. All it takes is a simple tweak with your device settings and downloading the right protection software and you should be secure.

Read more...



The advantages of going virtual

Virtualization_Feb24_CAs the need for IT solutions in many business operations continues to increase, the importance of virtual integration has grown tremendously. As a business owner, virtualizing your business provides a systematic way of putting your operations in order. With virtualization, you get to enjoy benefits that you might otherwise not be able to from your traditional systems.

Read more...



Be secured with defense in depth

Security_Feb11_CAs information technology systems get more complex, computer malware also gets stronger and more aggressive. An effective security strategy to protect your computer system from a variety of malware is to employ the concept known as defense in depth. In its simplicity, it involves implementing multiple secured layers wrapped around your computer system.

Read more...