Risks financial firms face

February 29th, 2016
Risks financial firms face

TTP’s stands for threats and tactics, techniques and procedures, the number of which has been gradually increasing since 2015. The financial services sector has long been the target for cyber criminals, where they apply a myriad of techniques ranging from social-engineering to credential-stealing malware.

Tips to speed up your WordPress website

February 27th, 2016
Tips to speed up your WordPress website

We’ve all experienced the frustration of a slow loading website. While ten years ago, you would just have to grin and bear it as a site loaded with all the urgency of a sloth, today’s Internet surfers are much more impatient. Most expect at least a three second load time, while some won’t settle for less than two.

Tips to use Office 365 more productively

February 26th, 2016
Tips to use Office 365 more productively

A paintbrush can create the Mona Lisa or the Last Supper. An airplane can bring passengers to exotic locations anywhere on the planet. And stone, deftly placed can produce wonders such as the Pyramids or Angkor Wat. But what do the paintbrush, airplane and stone all have in common? Without the wisdom of the painter, pilot or architect, they are nothing more than tools and materials.

How virtualization helps cut costs

February 26th, 2016
How virtualization helps cut costs

With the gradual integration of virtualization, many small and medium-sized businesses have seen many benefits that extend beyond their bottom line. Not only does it aid with cost efficiency but also with disaster recovery and several other areas of operations.

New Android malware can wipe your phone

February 22nd, 2016
New Android malware can wipe your phone

The smartphone. It may seem like the last safe haven from online security threats. As it rests snugly in your pocket, you may never even think a virus, trojan or other malware could ever touch it. And even if it did, how much damage could it really cause? Well, for Android users, we’ve got some bad news.

Windows 10 privacy protection tips

February 18th, 2016
Windows 10 privacy protection tips

It takes seconds to infiltrate and obtain private information. And while it’s unlikely that Microsoft will cause your business financial ruin with their data collection, the fact is that Windows 10 gathers a ridiculous amount of private information from users.

How scary is the new Mac scareware?

February 16th, 2016
How scary is the new Mac scareware?

If you wanted a classic example of how malware evolves, the new scareware discovered on Mac in the past few weeks is a perfect example. The way it attempts to fool users is unlike almost any of its predecessors. In other words, it’s very convincing.

Become better with these productivity tips

February 15th, 2016
Become better with these productivity tips

We live in the age of distraction. If it’s not the hundredth urgent email in your inbox that blows your focus, maybe it’s your IT staff pounding on your door with another technology emergency. Whatever the circumstance, you may be tired of looking in the mirror only to see bags under your eyes from too many late nights at the office.

LinkedIn tips for the SMB

February 12th, 2016
LinkedIn tips for the SMB

As a small business owner, you may be a bit perplexed how to gain the most value out of LinkedIn. You may have already spent countless hours trying to leverage the platform with little success. So what are you doing wrong? And how can you make the most out of your time on the platform? Here are a few tactics any SMB can follow to gain more value from LinkedIn.

Know LinkedIn’s purpose

Simply put, LinkedIn is not a content marketing platform.

5 time-saving Microsoft Word tips

February 11th, 2016
5 time-saving Microsoft Word tips

Although there are many alternatives out there, Microsoft Word remains one of the most popular and user-friendly word processors for businesses large and small, and for good reason too. It is compatible with both Windows and Mac and is highly capable of handling and creating business documents.