Blog
Limited investment capital and planning for trouble
Limited investment capital and planning for troubleSmall businesses often fail to take the time to make business continuity plans. One aspect of a business continuity plan involves developing plans to handle the loss of physical infrastructure and hardware....
Recent Posts
Cyber insurance 101
Cyber insurance 101What is cyber insuranceWith cybercrime becoming a major threat to businesses across the world, irrespective of their size, cyber insurance is fast becoming a necessity more of a necessity than a choice. However, the concept of cyber insurance is...
Website cloning: Don’t fall for that trap!
Website cloning: Don’t fall for that trap!Have you watched one of those horror movies where the something impersonates the protagonist only to wreak havoc later? Well, website cloning does the same thing--to your business--in real life. Website cloning is one of the...
BYOD=Bring your own disaster?
BYOD=Bring your own disaster?Workplaces today have changed. They extend beyond the working hours, beyond the cubicles. Whether you are commuting to work or even vacationing, chances are you or your employees take a break from the break to reply to those important...
Get smart about smartphones
Get smart about smartphonesWith flexible working schedules, remote teams and Bring Your Own Device (BYOD) policies in force, it is has become commonplace for employees and business owners alike to use smartphones for work purposes. A quick reply to an email, sharing...
Don’t sign up with that MSP just yet!
Don’t sign up with that MSP just yet!The decision to sign up with a MSP is a big one--you are essentially trusting someone with the backbone of your business–your technology infrastructure, so you need to make sure you pick someone with whom you can have a mutually...
The biggest threat to your IT infrastructure: Your own employees
The biggest threat to your I.T infrastructure: Your own employeesDid you know that your employees often unwittingly ‘help’ cybercriminals gain access to your system? Often, employees play a part in compromising the security of your IT infrastructure, even without them...