Technology BlogTechnology resources you can use right away!
Ransomware is an ever growing threat to Businesses causing major havoc to IT systems. Attacks such as Wannacry and Petya has caused companies ranging from small to Large global companies to close their doors. Learn how to protect your business from such attacks.read more
It takes just 11 hours for a hacker to crack a 6 character password. This time shrinks to just seconds if you’re guilty of using “123456???. But – throw in just 3 more letters and we’re talking upwards of 10 years. The sophistication of hacking...read more
Earlier this year, Gemalto released its twice yearly Breach level Index, a database that records all publically-reported global breaches. The report found that 1,673 data breaches led to 707 million data records being compromised worldwide during 2015....read more
If you think your IT will never be in the cloud, and you'll always have a device you can touch, do you really understand “CLOUD COMPUTING?” A governmental definition of Cloud Computing is a model for enabling ubiquitous, convenient, on-demand network...read more
Do you have a backup plan for your Office 365? Are you sure? Office 365 has become an increasingly popular option for business, school and personal email usage. This rise over the past few years has been due to the massive features and benefits that this...read more
By definition, identity theft is any kind of deception, scam, or crime that results in the loss of personal data, including the loss of user names, passwords, banking information, credit card numbers, Social Security Numbers and health ID’s, that is then used without...read more
Follow us on Social Media!
Sign up to receive business continuity news, tips & advice to protect your business