Blog

Chimera ransomware’s scary tactics

The threat of being infected by malicious software is part and parcel of spending time on the internet, and no sooner have the antivirus and security software programs released an update or new patch than cyber criminals are scrambling for ways to circumvent them. In addition, as end users become savvier to the tricks and […]

2016’s possible security problems

As shown by recent high-profile hacking scandals – targeting everyone from Sony Entertainment to the extramarital-affair-facilitating website Ashley Madison – cyber crime shows no sign of disappearing any time soon. In fact, experts predict that 2016 is going to be an even busier year for cyber criminals, hackers and scammers. So what do you need […]

Do.com: enjoy more productive meetings

When run effectively and with an objective in mind, company, departmental, managerial or even one-on-one meetings can result in big ideas, great change, and heightened productivity for your team of employees. On the other hand, if your meeting room is constantly booked up with people shooting the breeze, arguing over procedures, or simply rambling on […]

How to use data to add business value

Are you making the most of one of your business’s greatest assets? Along with your loyal customers, your team of enthusiastic and hardworking staff, and your tastefully decorated store or office, there is an all-too-often-unsung hero just waiting to help you take your business to the next level: your data. You’ve probably read articles extolling […]

Interruption insurance for businesses

Natural disasters have increased exponentially in the last few years – something that has resulted in a number of small and medium-sized business owners turning to business interruption insurance for protection. Covering many scenarios that regular business insurance simply ignores, adequate protection can be the make-or-break factor when it comes to surviving a natural or […]

How Google overcomes secure browsing issues

It’s safe to say that malware attacks, phishing scams, and social media engineering practices are going nowhere fast. That means that, whether you are a home user or the owner or manager of a small or medium-sized business, if you choose to ignore safer online security practices you are putting your identity and the security […]

Scenarios that might require BCP action

Do you know when to invoke your Business Continuity Plan? A lot of business owners assume they know when it will be required, but the reality is that it can be hard to determine when a BCP is really necessary. It’s important you are able to assess what is taking place, and make an informed […]