What would you do if you couldn’t access Facebook, Twitter, Instagram or any of the other social media platforms that you rely on to keep you up-to-date with the ins and outs of your friends’ lives, current affairs and celebrity gossip? Would you miss it or would it be a blessing in disguise? If you’re […]
Social Media in the Middle East
The curse of Chimera ransomware
The threat of being infected by malicious software is part and parcel of spending time on the internet, and no sooner have the antivirus and security software programs released an update or new patch than cyber criminals are scrambling for ways to circumvent them. In addition, as end users become savvier to the tricks and […]
IT security predictions for 2016
As shown by recent high-profile hacking scandals – targeting everyone from Sony Entertainment to the extramarital-affair-facilitating website Ashley Madison – cyber crime shows no sign of disappearing any time soon. In fact, experts predict that 2016 is going to be an even busier year for cyber criminals, hackers and scammers. So what do you need […]
Business interruption insurance 101
Natural disasters have increased exponentially in the last few years – something that has resulted in a number of small and medium-sized business owners turning to business interruption insurance for protection. Covering many scenarios that regular business insurance simply ignores, adequate protection can be the make-or-break factor when it comes to surviving a natural or […]
Twitter warns about cyber attacks
Something known as “state-sponsored cyber attacks” may not be something you have heard of until now. But with both Facebook and Google viewing the problem as serious enough to warn their users about, it seems this is an issue that could be here to stay. And now with Twitter also recently taking steps to alert […]
Google and the art of safe mobile browsing
It’s safe to say that malware attacks, phishing scams, and social media engineering practices are going nowhere fast. That means that, whether you are a home user or the owner or manager of a small or medium-sized business, if you choose to ignore safer online security practices you are putting your identity and the security […]
When should you invoke your BCP?
Do you know when to invoke your Business Continuity Plan? A lot of business owners assume they know when it will be required, but the reality is that it can be hard to determine when a BCP is really necessary. It’s important you are able to assess what is taking place, and make an informed […]
The keys to a successful Office 365 migration
Microsoft’s cloud-based Office 365 is a tool that promotes collaboration and productivity in the workplace – that’s just one of the many reasons businesses are adopting this powerful application. But migrating to the platform is not as simple as it might seem. There are many things to keep in mind, and it’s important that you […]
Don’t virtualize without answers
We’ve seen first hand just how beneficial office virtualization can be for small and medium-sized businesses. Of course the process isn’t as simple as snapping your fingers, or saying presto, and having a smooth running, virtualized office appear. It is a long process and you will have to answer a lot of questions. Here are […]
The difference between FXS and FXO
It’s easy to get lost in the confusion of FXS and FXO, especially if you’re a complete novice in matters of VoIP (Voice over Internet Protocol). These terms are often used in the telecom world, and understanding their difference is the first step in choosing the right VoIP system that best suits your needs. Here’s […]
