Email Spoofing

In All by Alex KallimanisLeave a Comment

The people that want access to your data are getting smarter all the time. One particularly damaging and common tactic that hackers use is called “email spoofing” or “spearphishing”. Don’t …

Website cloning: Don’t fall for that trap!

In All, Blog by Mike Abbott

  Website cloning: Don’t fall for that trap!   Have you watched one of those horror movies where the something impersonates the protagonist only to wreak havoc later? Well, website …

BYOD=Bring your own disaster?

In All, Blog by Mike Abbott

  BYOD=Bring your own disaster?   Workplaces today have changed. They extend beyond the working hours, beyond the cubicles. Whether you are commuting to work or even vacationing, chances are …

Get smart about smartphones

In All, Blog by Mike Abbott

  Get smart about smartphones   With flexible working schedules, remote teams and Bring Your Own Device (BYOD) policies in force, it is has become commonplace for employees and business …

Why you need the cloud?

In All, Blog by Mike Abbott

  Why you need the cloud?   When talking to our clients, we have noticed that SMBs often think the cloud is something for their bigger counterparts to explore. We …

Don’t sign up with that MSP just yet!

In All, Blog by Mike Abbott

  Don’t sign up with that MSP just yet!   The decision to sign up with a MSP is a big one–you are essentially trusting someone with the backbone of …

End of Year: Data Archive/Snapshot

In All by Alex Kallimanis

A good Backup and Disaster Recovery (BDR) plan is a central pillar of any Information Technology strategy. The BDR provides peace of mind in the event of data loss. In …

See All All Posts

Website cloning: Don’t fall for that trap!

In All, Blog by Mike Abbott

  Website cloning: Don’t fall for that trap!   Have you watched one of those horror movies where the something impersonates the protagonist only to wreak havoc later? Well, website …

BYOD=Bring your own disaster?

In All, Blog by Mike Abbott

  BYOD=Bring your own disaster?   Workplaces today have changed. They extend beyond the working hours, beyond the cubicles. Whether you are commuting to work or even vacationing, chances are …

Get smart about smartphones

In All, Blog by Mike Abbott

  Get smart about smartphones   With flexible working schedules, remote teams and Bring Your Own Device (BYOD) policies in force, it is has become commonplace for employees and business …

Why you need the cloud?

In All, Blog by Mike Abbott

  Why you need the cloud?   When talking to our clients, we have noticed that SMBs often think the cloud is something for their bigger counterparts to explore. We …

Don’t sign up with that MSP just yet!

In All, Blog by Mike Abbott

  Don’t sign up with that MSP just yet!   The decision to sign up with a MSP is a big one–you are essentially trusting someone with the backbone of …

IT Red Flags to Watch Out For

In All, Blog by Mike Abbott

  IT Red Flags to Watch Out For   As someone running a SMB, you probably have a lot on your plate. You are the core decision maker, responsible for …

See All Blog Posts

Don’t Get KRACK-ed

In All, Blog, BYOD, Manage Risk by Alex Kallimanis

By now you may be aware of the recent discovery of a security vulnerability in the WPA2 security standard for Wi-Fi networks, as reported by CNN, Fox News, cnet and …

See All BYOD Posts
See All Cloud Posts
See All Communicate Better Posts
See All Company Culture Posts
See All Compliance Posts
See All Contain Costs Posts

Don’t Get KRACK-ed

In All, Blog, BYOD, Manage Risk by Alex Kallimanis

By now you may be aware of the recent discovery of a security vulnerability in the WPA2 security standard for Wi-Fi networks, as reported by CNN, Fox News, cnet and …

See All Manage Risk Posts
See All News Posts
See All Operate Efficiently Posts
See All Plan Strategically Posts
See All Security Posts
See All Software Posts

Think you are too small

In All, Uncategorized by Mike Abbott

    Think you are too small to be targeted by a cybercriminal? Think again.   When I meet with clients, especially SMBs, I often hear them say that they …

Keeping your data safe: Access Control

In All, Uncategorized by Mike Abbott

    Keeping your data safe: Access Control   Cyberattacks are a commonplace today. Malwares such as viruses, worms and more recently ransomwares not only corrupt your data or hold …

Benefits of Using VoIP Technology

In All, Uncategorized by Mike Abbott

Benefits of Using VoIP Technology More and more businesses are implementing Voice over Internet Protocol or VoIP technology because of its versatility, flexibility and cost effectiveness. With new developments in …

Disaster Recovery Plans: Do You Have One?

In All, Uncategorized by Mike Abbott

Disaster Recovery Plans: Do You Have One? Disaster recovery and business continuity plans are issues that almost all small businesses fail to think about. More frequently, they decide they haven’t …

See All Uncategorized Posts