Cloud Computing and Security What is your responsibility as a customerand what is the responsibility of your provider Cloud computing is the delivery of computer services via the internet. This is an oversimplification, but hopefully it will be made clearer…
What is Malware and How Does it Work?
In this article we look at 9 different types of malware and how they work.
What is Ransomware and How does it Work?
Ransomware is a form of malware (malicious software) that threatens to publish, block or delete a victim/s computer files, databases or applications.
6 Phases of a Ransomware Attack
Additional Writing Credit: Evan McLean – Microsoft Certified Security Administrator for JIG Technologies 6 Phases of a Ransomware Attack Phase 1: Exploitation and Infection The first step is to infect a victim’s computer with malware. This can be achieved by…
How to Protect Yourself from Phishing
Learn how to identify and protect yourself from phishing.
How do Consumer Laptops and Business Laptops Compare
How to pick the right laptop Business Laptops versus Consumer Laptops An IT Company review on what the best options are for you and your organization Performance | Technical Features | Appearance | Pricing | Serviceability It’s hard to know just…
Managed Service Providers vs. In-House IT
Managed Service Provider VS In-House IT Managed Service Providers (MSPs) will typically cost less annually than a full-time salary for a small to mid sized business. Most Managed Service Providers offer several flexible payment options to suit your business needs.…
Top 5 IT Mistakes Small Businesses Make
Number Five 5 Not verifying backup, or having backup retention All business owners know that backup is important and often set it up. However, many forget to test or run multi-layer backup retention. Here are some real-life examples that we’ve…
Fear Machine Learning
Advances in artificial intelligence (AI) have brought us to the point where systems are using a combination of algorithms, analysis, and experience to learn and program themselves without human intervention. For instance: [bctt tweet=”38% of consumers believe that AI will…
The Hidden IT Security Threats Right in Your Office Today
There are a lot of reports in the news about IT security threats and the damage they have caused. This has put a larger focus on implementing firewalls and anti-virus systems to prevent hackers from afar getting into our systems.…