SMBs Can Become a Weapon in Cyberwarfare

Headlines today highlight Ukrainian tragedy or North Korea testing missiles. It can seem far away from your business, yet battles are being fought online, too. Your small business's IT systems could be weaponized for cyberwarfare. That statement may surprise you. You've heard of cyber targets such as: critical national infrastructure;election and v...
Continue reading
  16 Hits
16 Hits

What an MSP Can Offer Your Business

The Benefits of having a Managed Service Provider It's not as if the name "managed services provider " (MSP) is that self-explanatory. You might read that business description and have no real idea what it is an MSP can do for you. We're providing managed services … OK, but what does that mean? To make things easier, this article outlines the actua...
Continue reading
  19 Hits
19 Hits

Think Before Sharing That Link

Learning to share is an important early-life skill. Now, you've mastered it, and you're out in the workforce. Happily, digital technology makes it much easier to share business files, but that doesn't mean you want to do so willy-nilly. Consider these best practices for sharing with both internal and external users. Cloud sharing makes it simple to...
Continue reading
  48 Hits
48 Hits

Prioritise data security when employees leave

 8 Steps to Protect Your Company Data When People Leave  Businesses can expect one in five of their employees to turnover in an average year. You can be doing all you can to retain your people, but are you also prioritising data protection when people do leave? Our free ebook, 8 Steps Protect Your Company Data when People Leave explo...
Continue reading
  78 Hits
78 Hits

Small Business Can’t Sacrifice Cybersecurity

Prioritise Cyber Security for your Small Business For small businesses, it can be tempting to postpone cybersecurity efforts. There are many common excuses: "There's so much to do," "There's not enough budget," "Our business is too small to target," etc. But right now, cybersecurity is a must-have for every business. Think of it like business ...
Continue reading
  81 Hits
81 Hits

The Business Risk of Abandoned Domain Names

When setting up your small business website, you want a memorable name and sleek Web design. You know your website is an important online calling card. Then, when you grow or your business evolves, you might rebrand and add a site. But wait, don't abandon the old one. When you set up your Web presence, you select a domain name, and it's part of all...
Continue reading
  103 Hits
103 Hits

What is working with an MSP worth?

Explaining all that you gain from partnering with a managed service provider Technology is the backbone of your business; you can reduce risk and improve productivity with a managed service provider (MSP). Still, we're often asked to help potential clients understand the value of partnering with an MSP. This ebook improves your understanding of MSP...
Continue reading
  99 Hits
99 Hits

Psst … What’s Your Master Password?

 The Benefits of using a Password Manager All of us like to think we are unique. That thinking extends to our passwords too, right? We're special and distinct, so no one could guess our chosen collection of letters, numbers and symbols. Well, it's surprisingly easy for algorithms to determine passwords and to do so extremely quickly. So, a pas...
Continue reading
  114 Hits
114 Hits

Could the Business You Work for be More IT Savvy?

Working for a small business, you can be asked to wear many hats. Even if one of your many roles is not IT, you may need to speak up about your business technology or cybersecurity. It's easy to think cybersecurity is someone else's responsibility, but IT may not be getting the attention it deserves, and that could be damaging to the business, your...
Continue reading
  218 Hits
218 Hits

How to Prevent Password Spraying Attacks

Bad cyber actors are what the kids these days would call "try hards." They do everything they can think of to get into your accounts. One tactic is password spraying. In case you don't know about it, this article gives the basics and shares strategies to prevent this type of attack. You're probably familiar with hackers trying many different passwo...
Continue reading
  164 Hits
164 Hits

On-premises Software “Ownership” vs. The Cloud

 Cloud computing is common in business. Yet there are some who remain sceptical. One of the sticking points is that the business doesn't own the software it is using in the cloud. This can cause concern, but this article helps you weigh up the options. Your business has two choices really. Buy a software package and install it on your devices,...
Continue reading
  131 Hits
131 Hits

Ransomware a Risk for Your Home Computing

Ransomware headlines focus on interrupted hospital services or downtime at several major brands. But ransomware can just as easily infect your home computer. When you're a victim of ransomware, you aren't able to do anything on your computer. Cybercriminals encrypt your files and demand you pay a ransom to unlock your device. They'll ask for crypto...
Continue reading
  163 Hits
163 Hits

Turn Your Tablet into a Child-Friendly Device

Turn Your Tablet into a Child-Friendly Device Tablets are convenient, light, and portable. Maybe you got a new one during the holiday, or your old one needs replacing. You can feel better about moving to the new device if you turn the old tablet into a child-friendly device. Here's how. Before giving your tablet up, clear your browsing history, ema...
Continue reading
  150 Hits
150 Hits

How to Safely Retire Old Devices

 It's inevitable that we'll retire old devices to upgrade to the latest and greatest. A new laptop, desktop, or phone is exciting. Yet, before you get too distracted by your shiny, new device, take the time to safely retire the old one. When buying the new device you may take trade-in value. Otherwise, you may let that old iPad sit in your dra...
Continue reading
  68 Hits
68 Hits

3 Reasons to Avoid Signing in With Facebook or Google Accounts

Nine out of ten times today when you visit a website you're asked to sign in. To add convenience, many sites offer the ability to sign in using a Facebook or Google account. Sure, it's simpler, but this article will share three key reasons why you might want to avoid this easy route. It's estimated that we each have an average of 100 passwords. Tha...
Continue reading
  76 Hits
76 Hits

How to Spot Email Spoofing

 The number of emails we get daily can be overwhelming. We could be excused for not looking at them all closely – well, almost. Except that not taking care to review emails for signs of spoofing could be a real risk to your business. Learn about email spoofing and how to avoid it in this article. How to Spot Email Spoofing First, what is email...
Continue reading
  204 Hits
204 Hits

Zero-day attacks wreak havoc — protect your business

FREE Guide: Zero-day attacks wreak havoc — protect your business You work hard to secure your business network. Yet determined hackers probe persistently until they find a software vulnerability you don't know about. They use this previously unknown and unpatched flaw to do their worst.Zero-day attackers can steal data, corrupt files, take control ...
Continue reading
  172 Hits
172 Hits

The Unexpected Benefits of Password Managers

 The Unexpected Benefits of Password Managers The main advantage of a password manager is obvious to anyone with more than one account online (i.e. everyone); instead of remembering all 100 usernames and passwords, the password manager auto-fills them. It's a boon. But it's not the only reason to use a password manager. This article shares sev...
Continue reading
  163 Hits
163 Hits

Tech Tips for Small Business Owners in 2022

A new year is a chance for a fresh beginning. To that end, try these tech tips for small business owners to kick 2022 off right. First, launch a successful new year for your business by going mobile. Agility is one of the key differentiators of a small business. Be more flexible than larger competitors by taking full advantage of cloud computing. U...
Continue reading
  150 Hits
150 Hits

To Delete or Archive Email, That Is the Question

An email inbox can get overwhelming. It's estimated we send 306 billion emails daily; not you personally, of course, although it may feel that way. So, you have to develop strategies to corral the communications, one of which is deciding whether to delete or archive an email. This primer will help. First, let's consider the drawbacks to having all ...
Continue reading
  185 Hits
185 Hits