Email Spoofing

In All by Alex Kallimanis

The people that want access to your data are getting smarter all the time. One particularly damaging and common tactic that hackers use is called “email spoofing” or “spearphishing”. Don’t …

Website cloning: Don’t fall for that trap!

In All, Blog by Mike Abbott

  Website cloning: Don’t fall for that trap!   Have you watched one of those horror movies where the something impersonates the protagonist only to wreak havoc later? Well, website …

BYOD=Bring your own disaster?

In All, Blog by Mike Abbott

  BYOD=Bring your own disaster?   Workplaces today have changed. They extend beyond the working hours, beyond the cubicles. Whether you are commuting to work or even vacationing, chances are …

Get smart about smartphones

In All, Blog by Mike Abbott

  Get smart about smartphones   With flexible working schedules, remote teams and Bring Your Own Device (BYOD) policies in force, it is has become commonplace for employees and business …

Why you need the cloud?

In All, Blog by Mike Abbott

  Why you need the cloud?   When talking to our clients, we have noticed that SMBs often think the cloud is something for their bigger counterparts to explore. We …

Don’t sign up with that MSP just yet!

In All, Blog by Mike Abbott

  Don’t sign up with that MSP just yet!   The decision to sign up with a MSP is a big one–you are essentially trusting someone with the backbone of …

End of Year: Data Archive/Snapshot

In All by Alex Kallimanis

A good Backup and Disaster Recovery (BDR) plan is a central pillar of any Information Technology strategy. The BDR provides peace of mind in the event of data loss. In …