Twitter warns about cyber attacks

Earlier this month, social media platform Twitter alerted a number of its users to the fact that their accounts may have been hacked into by something, or someone, known as a “state-sponsored actor.” While a warning of this kind is certainly not unprecedented – for some time now, both Facebook and Google have also been…

keep reading

Don’t download that health app just yet

Mobile health applications have been growing in popularity but this doesn’t necessarily mean their effectiveness is improving. In fact, doctors have called for greater oversight and regulation when it comes to health apps as many have never been truly tested. A number of these apps also make false claims about benefits in order to get…

keep reading

Google and the art of safe mobile browsing

With the vast majority of end users turning to Google as their search engine or default browser of choice, it comes as no surprise to learn that the company takes security seriously. But in a perpetually changing landscape where anti-virus and anti-malware tools are constantly chasing their tails in order to stay up to date…

keep reading

When should you invoke your BCP?

A Business Continuity Plan (BCP) is a valuable security blanket for countless companies across the nation. And while business owners hope they never have to invoke their continuity plan, it is important to understand which events might necessitate it coming into action. By understanding how certain disasters can impact your business, you’ll have a better…

keep reading

Cortana tips to make your life easier

Wouldn’t it be grand if you could afford to hire your own personal assistant? Someone who could take care of menial tasks, sing songs to you, and generally just make your life more pleasant? As technology develops, we are getting closer and closer to virtual assistants who are just as good as their real-life counterparts….

keep reading

The keys to a successful Office 365 migration

Microsoft Office 365 is growing in popularity as more and more businesses make the move to the cloud. However, without proper planning and testing beforehand, you could get stuck in the middle of the migration process, end up with duplicated data, or even have to abort the transition completely. Needless to say, all of these…

keep reading

Don’t virtualize without answers

For small or medium-sized business, getting a leg up on the competition can be the difference between simply surviving and thriving. One way of doing this is by embracing virtualization. Many SMBs have used virtualization techniques to great effect, but implementing a change can be difficult and time-consuming. Here are a few questions you should…

keep reading

The difference between FXS and FXO

Voice over Internet Protocol (VoIP) systems are designed to provide a reliable and cost-effective telecommunication environment for businesses. If you’re looking to deploy a VoIP telephony system for your company, you’ll probably come across the acronyms FXS and FXO from time to time. But what exactly do these phrases mean? Here, we’ll explain the difference…

keep reading

Adding value to your company’s blog

Blogging has gone from being a fun side project for aspiring creatives to an absolute necessity for businesses of all sizes. For many companies, especially small to medium-sized ones, it’s likely to be just about the only web page that is updated with any regularity on their websites. And that’s why you need to be…

keep reading

How to respond to criticism online

The majority of the population uses the Internet everyday. And when a customer feels they’ve been wronged, it is incredibly easy for him or her to go online and vent their frustrations. So when this happens, how do you handle it? Here are some tips as to how to react to negative brand criticism, so…

keep reading