The Blog
Our team of experts share their knowledge, thoughts and ideas on various IT topics such as automation, security, project management and more.
Subscribe to keep up to date with all our latest articles
Password Management: The First Line of Defence
You’re at war. Readying the first line of defenses. Who you gonna call? Not ghost busters. We’re fighting digital enemies here. Passwords! Your first line of defense are passwords. Think of passwords as the keys to your digital kingdom. Weak, easily guessed passwords?...
Test2
Jon Snow is a fictional character in the A Song of Ice and Fire series of epic fantasy novels by American author George R. R. Martin, and its HBO television adaptation Game of Thrones, in which he is portrayed by Kit Harington. In the novels, he is a prominent point...
Dark Web, what it means for your business
The last decade has been rife with incidents of data theft and security breaches that have compromised millions of individuals and businesses. More than 63% of confirmed data breaches are due to weak, default or stolen passwords.
Can you plan for a disaster?
Late last year, reports started circulating about people in China becoming infected with pneumonia. Officials said they were monitoring to prevent it being spread and developing into something more severe.
Cloud Backup – Is Your Head in the Cloud?
Along with staff, businesses recognise that data is their most valuable intangible asset. Why take backup lightly when it carries heavy business value.
Held to ransom
Ransomware encrypts folders and files, rendering them inaccessible. Criminals demand a ransom in return for the decryption keys and even an additional fee to prevent public release of the stolen data. It disrupts business and cause reputation damage to organisations. Review your security policies and strengthen security posture periodically to keep you away from malicious attacks.
Subscribe Today