Ransomware continues to grow as the method of choice for cybercriminals to extort funds from their victims. Cybercriminals who carry out these attacks are incentivised to continually look for new ways to stay ahead of the curve to capitalise on vulnerable computer...
Windows 7 End-of-Life January 2020! Yes that’s correct, you now have until January 14th, Tuesday next week! We’ve got our clients covered, but if you or someone you work with are still on Windows 7, here’s some info you need to read, check out the...
Cybersecurity: technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access! ...
With today’s businesses relying on technology more than ever it’s essentially the heart of the technology environment – the network, is always connected:...
As a proactive CEO, you know that implementing a solid business continuity and disaster recovery (BCDR) plan is essential for your business. After all, why would anyone in your position ever put their business at risk of downtime or data loss when prevention is so...
Storing data in cloud applications is far safer than storing data on most on-premise storage systems — but “safe” does not equal “invulnerable.” In fact, one third of SaaS users report losing data in the cloud. Yes, the cloud is safe, but it’s not infallible and...