Blog

Different types of hackers defined

Know thy enemy. When it comes to hackers, most business owners get hung up on the technical and mechanical details of a cyber attack forgetting another important aspect: motive. Why are they attacking people and organizations in the first place? And who are they targeting? By answering these questions you’ll have a better understanding of […]

How to get 500+ LinkedIn connections

500+ LinkedIn connections can open doors. It can lead to more business, new clients, and provide social proof to yourself or organization. However, getting to 500+ connections can seem like a daunting task, especially if you have a business to run. So how can you break through and become a LinkedIn power networker? Here are […]

How is BYOD a security risk?

Bring your own device (BYOD) strategy is when an employee uses their personal mobile device to work with your company from anywhere. This strategy can bring about many advantages to your business such as increased efficiency and convenience. However, this can also bring a number of security risks for your IT infrastructure and data. If […]

Technology ROI 101

Your technology needs to produce a return on investment. If it doesn’t, you’re wasting you and your staff’s time and money. But how can you ensure you gain that coveted ROI you’re after? What does it actually mean to have a positive ROI? And how can you tell if you have one? Here are a […]

3 Disaster Recovery myths

Disaster Recovery ain’t what it used to be. Long gone are the days where a DR solution cost over a hundred thousand dollars and predominantly relied on tape backups. With the onset of cloud computing, today’s DR landscape has dramatically changed. But, unfortunately, there are still many misconceptions about DR still hanging around. Here are […]

Monitoring employees online. Is it right?

Whether or not to monitor your employees’ computers can be a tricky decision. While part of you may think it’s unethical, you also may question if your staff are spending too much time on non-work related activities, and taking advantage of you in the process. So, should you monitor? Here are some pros and cons […]