Blog

3 IT security take-aways from the Sony hack

3 IT security take-aways from the Sony hack

Any business can become the victim of security breaches on a mass scale, as shown by the debacle which recently eclipsed Sony and forced it to temporarily cancel the release of blockbuster movie The Interview. Beneath the dramatic headlines are lessons for small business owners everywhere in how simple errors in IT security management can have grave consequences.

Looking at a new spear phishing attack

Looking at a new spear phishing attack

Take some time and research how companies are hacked and you will quickly come to realize that there are a wide variety of methods at a hackers disposal. One of the increasingly common, and effective strategies being employed is spear phishing. In early December 2014, a new spear phishing attack was uncovered, one that has proven to be quite effective against large businesses, and could possibly target small companies as well.

What are online backup solutions?

What are online backup solutions?

With a Disaster Recovery Plan and Business Continuity Plan, businesses need to ensure that a proper data and system backup solution is in place. There are many different ways to implement a backup solution, with one of the most common being online or cloud-based backup.

Why social media content isn’t shared

Why social media content isn’t shared

Social media has come to play a large part in the content marketing campaigns of many businesses. While creating a solid presence can be beneficial for businesses, owners often struggle to get their content shared. There are many reasons why, but here are four main ones that you should be aware of and what you can do about them.

Email 101: PAR structure

Email 101: PAR structure

When first introduced, email was viewed simply as an electronic version of memos and business letters, and were usually formatted thus. Over time, email has become much more informal, leading to a more natural form of communication. While this is great, there can be times when emails come across as unstructured and unclear, leading to frustration and even a loss of productivity.

5 Affordable business systems

5 Affordable business systems

The end of the year can be a stressful time for all. Businesses are busy preparing to finish the year and are usually tied up planning for the year ahead. This often means looking for new, yet affordable, business systems that can make tasks and business operations easier.

Transitioning to the cloud in 2015

We hear about "the cloud" almost everywhere we go, and use some form of cloud computing almost every day. By now, most professionals understand what cloud is. However, the advantages - and risks - of cloud for business needs are not often clearly understood.

Using audio-visual to improve business communications

Audio-visual communications in the workplace have come a long way since the age of oversized tube televisions and crackling, fabric-covered speakers. The way we communicate today is increasingly focused on a multimedia experience, and businesses and organizations are using audio-visual  to create multi-sensory communication models that increase retention and clarity for meetings & presentations.

Enhance output with managed print

Printing is an important part of any company’s infrastructure. Many infrastructure elements of companies have been integrated with technology to make them more efficient, or reduce operating costs. This isn’t true for printing - many companies struggle with high printing costs, or inefficient output.

Is Regin a real threat to your company?

Is Regin a real threat to your company?

While there are many different types of malware out there, the good news is that with many threats we know where they come from and their purpose. Recently, news broke of a new form of malware called Regin that is causing quite a stir in the security community, largely because it’s tough to deal with and not much is actually known about it.