In this video, four companies – ASOS, British Airways, Rockwell Automation and GEICO learn how the Microsoft Azure cloud helps them succeed in their respective industries. Although each of these companies has rigorous, specialised data requirements, Azure delivers the capabilities and massive scalability they need to step up their operations. Azure can do the same … Read More
Your account was hacked!
I’ve had a few people contact me yesterday/today to describe having received an email with this or a similar title. The body of the email goes on to describe the email address of the user and in some cases a password that they use or have used. It then requests an amount of money be … Read More
Security Alert – Java Security Update 8u171
Oracle has released security updates for Java 8. If you must use Java it is highly recommended that you install this latest update. Use the Offline download where possible. This is to avoid the prompter asking you to install the Ask or McAfee or other adware toolbar. Disable Java in your browser unless required. If … Read More
BYOD for Small Business
A significant amount of progressive small businesses are tossing away employee IT equipment for BYOD systems. What is BYOD? BYOD is an acronym for Bring Your Own Device, a new type of business network where employees literally bring their own devices to work. Sounds like a fantastic idea, doesn’t it? Let’s cover some benefits! The … Read More
Protecting Small Business from Ransomware
Ransomware is a big problem for small businesses all over the world. Ransomware is a type of malware that encrypts data on a hard drive, usually user data like documents, contacts, photos, emails, and financial records. It then holds this data hostage, demanding a large ransom in return for this data to be restored and … Read More
Securing Your Small Business IT Network in 3 Easy Steps
The malware known as Gooligan took the world by storm when it hijacked over a million Google Play accounts. Of course, businesses with strong IT security weren’t affected… giving more reason than ever to businesses everywhere to strengthen their own IT security policies. The funny thing is, when many businesses hear about major threats like … Read More