Five ways to stop data theft

Five ways to stop data theft

Look around the office. One in four of the people will take or share sensitive company information when they leave their job. The findings from a 2016 survey of 600 employees in seven industries by Biscom show that employees are the greatest risk when it comes to data theft.   The survey also found the […]

Read More »
Convertibles make health care IT flexible

Convertibles make health care IT flexible

Computers have traditionally come in one of a few carefully defined forms. Desktop computers are systems that you go somewhere to use. Laptop computers are machines you can carry different places to use. Tablets are devices you can use while standing up.   Health care professionals and administrators would choose the platform that would be […]

Read More »
Do you need more security features?

Do you need more security features?

Security is one of the areas of spending in which the budget rarely gets smaller, because security is important to every organisation. It’s critical that only authorised users are able to access enterprise applications and information.   As phishing and other social engineering attacks proliferate, IT departments look for new ways to ensure the person […]

Read More »
Ransomeware does not have to succeed

Ransomeware does not have to succeed

Unlike many other attacks and malware types, the goal of ransomware is as well known as the method: Critical data is encrypted until the victim pays for the key. For some industries, the question isn’t whether organisations will be hit, but when. After that, the questions tend toward the practical: How can companies avoid becoming […]

Read More »
Which cloud solution is right for your business?

Which cloud solution is right for your business?

As recent trends indicate, many businesses already have or will soon adopt cloud services. This widespread adoption is driven by a desire to modernise IT systems, create flexibility, and improve profitability.   There are three main approaches to cloud solutions: private cloud, public cloud, and a mix of both known as hybrid cloud. Each approach […]

Read More »
The hackers are coming for you, too

The hackers are coming for you, too

It is the trickle-down effect no SMB wants. The big businesses are getting better at locking up their IT, so the criminals are scanning for softer targets. The pickings are still rich:   SMBs often have vast collections of credit card data and other valuable information. If they work with larger corporations, their systems could […]

Read More »