Notification Fatigue

App notifications

The number of applications that employees use on a regular basis continues to increase and a lot of these apps have various alerts. We get a “ping” when an email arrives, a comment is added in Teams or when someone tries to contact us in WhatsApp. Then when Windows needs an update, the antivirus hasn’t done a scan or if a problem occurs on the computer another ping or notification pops up. Continue reading

Protecting Yourself From Identity Theft

Many everyday objects can lead to identity theft and they can often get overlooked because your focus is on your computers and cloud accounts. Yes, it is important to have strong passphrases and use antivirus on your PC, but you also need to be wary of other ways that hackers and thieves can get access to your personal data. Here are six common things that criminals can use to steal your information. Continue reading

Some Ways to Cut Spam from Your Email

Why Spam is a Small Business Nightmare

You may have hundreds, even thousands of emails in your inbox – including a load of spam messages. Spam wastes your time and we hope these few tips can help keep your inbox clear of spam messages. Continue reading

If You Find a USB Drive – Destroy It!

Malicious USB

If you ever come across a USB or thumb drive, that you do not recognize, leave it where it is or destroy it. It may be one you found on the ground outside your office, in a public place or even one sent to you out of the blue. Yes you may be curious and want to return it to its owner or see what it contains but the risks are too high. Continue reading

Are Your Cloud Accounts Configured Correctly?

Cloud Account Configurations

Misconfiguration of cloud solutions is often overlooked when companies plan cybersecurity strategies. Cloud apps are typically quick and easy to sign up for and the users assume that they do not need to worry about security because it is handled by the provider. This is an incorrect assumption because cloud security is a shared model. The provider of the solution handles securing their backend infrastructure and the user is responsible for configuring security settings in their actual account. The problem with misconfiguration is huge and is the number one cause of cloud data breaches. Continue reading

Why You Should Upgrade To Windows 11

Windows 11

Microsoft released the Windows 11 OS or Operating System over a year ago and it has been well-received as stable and user-friendly. The OS is not a large departure from the Windows 10 experience but does offer a lot of improvements over the older environment. With improvements and a free upgrade for Windows 10 users, it still lags in adoption though. As of November 2022, Windows 10 still owns a 69.75 percent usage share as compared to 16.13 percent for Windows 11. Continue reading

4 Tech Trends to Know About for 2023

A new year is an opportunity to start afresh. This is also true for your technology initiatives. Your business can begin 2023 on the right foot by considering these four important IT trends. Continue reading

7 Tips To Prevent Mobile Malware

Mobile Device Security

Cybersecurity researchers uncovered that mobile malware attacks surged by 500% a the start of 2022. This is alarming both in scale and the fact that many people are not yet protecting their smartphones. Year after year, mobile phones have become more powerful and today can do many of the same functions as a computer – just with a much smaller screen. But people tend to secure their computers much better than they do with their smartphones and this needs to change as over 60% of digital fraud now occurs through mobile devices! This makes all mobile devices a high risk if proper safeguards are not followed. Continue reading

8 IT Checks to Make Before You Travel

Travelling with technology

Most of us won’t even travel to the end of the block without our phones and when we go on longer trips, we can end up take a lot a tech.  You can travel smarter and more securely by doing several checks before you go by using our handy tech travel checklist below. The checklist can save you from suffering from lost devices, missing chargers or even a data breach. Continue reading

What Is Cybersecurity Insurance?

Cyber Insurance

While cybersecurity insurance is still a pretty new concept for many small businesses, it has been around since the 1990s to provide coverage for mainly large enterprises. Back then it covered things like data processing errors and online media. Since that time, the policies for this type of liability coverage have changed. Continue reading