What form of MFA Is The Best?

2FA / MFA Issues

With a lot of business processes now largely cloud-based, compromised passwords are the quickest and easiest way for bad guys to exploit computer systems. So how can you protect your online and offline accounts and data? The best way is with multi-factor authentication (MFA). See our blog article on Why Multi-Factor Authentication is Important.  Continue reading

Help, I dropped my laptop! – What now?

Laptop damaged

Dropping your laptop is never a good thing but it does not always lead to serious damage as it will depend on the following factors:

  • how hard and far it fell;
  • whether it was running at the time of the fall;
  • what kind of surface it fell onto;
  • the type and size of the laptop;
  • whether you have a mechanical hard drive or a solid-state drive;

Continue reading

7 Signs That Your Computer Is Infected With Malware

Infected Systems

Malware (short for malicious software) is an umbrella term that encompasses many different types of malicious code including:

  • Viruses
  • Spyware
  • Ransomware
  • Adware
  • Key loggers
  • Trojans
  • And more

Continue reading

Boost Productivity With Multiple Monitors

Dual Monitor Setup

Using two or more screens on your computer is no longer reserved for specialised jobs or computer geeks. Having additional displays can benefit anyone, even office users can benefit greatly by using the extra screen space. Continue reading

6 Ways to Stop Social Phishing Attacks

6 Ways to Stop Social Media Phishing Attacks

Phishing is the number one method of attack for everything from ransomware to credential theft. Email phishing is the main method for delivery but other delivery means are on the rise. Continue reading

4 Google Search Tips To Save You Time!

Google Search Tips

Did you know that there are over 2.4 million searches every minute on Google?

Most people search daily for both personal and work needs, and finding the actual results you need can take some time as you often have to wade through irrelevant results. Continue reading

8 Steps To Protect Company Data When People Leave

Protect Company Data When Staff Leave - eBookPrioritize data security when employees leave 

Businesses need to expect that one in five of their employees to leave in an average year. You can be doing all you can to retain your people, but what are you doing to protect company data when some do leave? Our eBook, 8 Steps Protect Your Company Data when People Leave explores: 

  • Risks to sensitive information when people leave your business.
  • Best practices to protect your business data 
  • Ways an IT service provider can help secure your business data.

Our latest eBook shares strategies to help fight employee turnover in the first place and also .

Click here to download our eBook on “8 Steps To Protect Company Data When People Leave”.

6 Things Not To Do On A Work Computer

Things not to do on a work computer

Whether you work remotely or in an office, there is a fine line between personal and work tasks on a company computer. Like a lot of people that are in front of a computer for most of their work day, it is not unusual to get attached to your desktop laptop or PC. Continue reading

The Power of a Password Manager

Password Managers

All of us like to think that we are unique and that thinking extends to our passwords too, right? We are special and distinct, and no one could guess our specific combination of letters, numbers and symbols. Well, did you know that it is very easy for computers to very quickly determine passwords. So, using a password manager is a great move, as you can securely store your passwords in an easily retrievable way. But is your master password for your password manager secure, original and long enough? Continue reading

Ransomware is a Risk for Everyone – Big or Small!

Ransomware - Need To Know

Most people see reports on ransomware hitting government departments,  hospitals and other big name companies. As such they think it won’t happen to them as the bad guys are just targeting the larger companies and organisations, but ransomware can just as easily infect your own computer. Continue reading