Blog

Big gains for small-business IT in 2017

Big gains for small-business IT in 2017

How many new technologies did your business adopt last year? Too many? Too few? You’ve officially made it through 2017 and there’s no better time than now to review which IT fads were worth investing in, and which ones should be left in the past. Look no further than our recap of last year’s most […]

Is EHR useful?

The fact that the world is going digital is unprecedented. With that in mind, the healthcare industry has also decided to embrace the digital trend in the form of EHRs. Short for electronic health records, this new type of data management system aims to improve on traditional paper-based ways. But will it? What is an […]

Tips to protect your smartphone

Tips to protect your smartphone

Cyber criminals will always be eyeing your data regardless of where it’s stored. That means even your trusty Android phone or iPhone isn’t safe. In fact, it may be more exposed to security risks than you think. These tips can help increase your mobile’s security. Set a strong password Whether your device requires a 4-set […]

6 Microsoft Teams tips

6 Microsoft Teams tips

Despite being late to the group chat scene, Microsoft Teams is equipped with a handful of features and impressive integration that set it apart from its competitors. So if you’re already subscribed to Office 365, here’s how you can take Teams to the next level. Use SharePoint to store and share files You might already […]

Phishers use encrypted sites to scam

Phishers use encrypted sites to scam

Just when you thought cyber criminals couldn’t get smarter, along comes a new scamming technique. Previously used for safeguarding browsing activity, encryption tools are now used by hackers in carrying out phishing scams. This means some fraudulent sites may have HTTPS on their address, giving users a false sense of security. How hackers use encryption […]

Update your Mac ASAP

Update your Mac ASAP

With new vulnerabilities discovered every day, it’s important for users to keep their computers up to date. The problem is many find this process tedious and sometimes ignore it altogether. But if you’re a Mac user, we urge you to install the latest patch as soon as possible. Serious bug On November 28th, security researchers […]

A keylogger found in HP laptops

A keylogger found in HP laptops

Are you using an HP laptop? If so, your machine might have a keylogger pre-installed. This means every stroke you hit on your keyboard can be recorded and your passwords and personal details can be exposed. But don’t panic. We’re about to tell you how to remove it while educating you about this sneaky software […]

Gmail gets more add-ons!

Gmail gets more add-ons!

Add-ons and swim rings share one thing in common — they both can save your life! While it might not be literal in the case of the former, add-ons do heaps to streamline your everyday tasks and literally save you hours of work. If you use Gmail, you can experience it today! Google’s focus is […]

Identity and Access Management 101

Identity and Access Management 101

Whether it be cloud, mobile, or on-premises, every technology you use stores certain confidential data that are accessed by your employees. So how do you guarantee the safety of said data from cyber threats like identity theft, phishing attacks and more? IAM is the answer. What is IAM? Identity and access management is a system […]

MTD enhances your business’s security

MTD enhances your business’s security

More and more customers are using their smartphones and tablets to browse and purchase products. That is why many businesses are adopting a mobile-first strategy and shifting their focus on improving their websites on mobile platforms. But to stand a better chance of enhancing business security, you need to adopt mobile threat detection (MTD) tactics. […]