Category: Articles

alex-kotliarskyi-QBpZGqEMsKg-unsplash (1)

08

Apr2021
Lacking talent and resources is painful There is an increasing drive to reduce costs and improve operational efficiencies through technological innovation. This naturally translates into a growing number of IT projects, where success or failure of a business can often hinge on the ability to complete these projects on time, within ... Read More
April 8, 2021Bennet Hammer
IT Security

08

Apr2021
Executives and board members realize the importance of building a strong information security program. Current efforts to protect information are now subject to more scrutiny by their customers, insurance companies, and the government. Ransomware and cyber-attacks have elevated global awareness of what makes for a solid information security “program.” But ... Read More
April 8, 2021Bennet Hammer
Prevent_data_loss_in_five_easy_steps_LP

18

Aug2018
We’re now living in the data economy, so you can’t afford to neglect the possibilities of employee actions causing data leakage. Sometimes this can be malicious; it’s been estimated that one-quarter of employees will take or share sensitive company information when they leave their job. The findings of a 2016 Biscom ... Read More
August 18, 2018Bennet Hammer
ai

02

Aug2018
Most people get artificial intelligence wrong. The problem researchers are working on isn’t understanding how to make a machine think – it’s understanding how humans think, so we can create machines that do the same. We hear a lot about AI’s potential, but already there are plenty of apps and systems ... Read More
August 2, 2018Bennet Hammer
Your_password_is_weaker_than_you_think_LP

29

Jul2018
Passwords are still a major security weakness. Easy-to-crack passwords can render even the most sophisticated (and expensive) security measures powerless. Yet despite this vulnerability being well known, too many of us persist with passwords that are weak, easy to guess or repeated across multiple log-ins. It's understandable: most users struggle to remember ... Read More
July 29, 2018Bennet Hammer
The_cloud_is_bringing_a_storm_of_innovation_LP

08

Jul2018
Cloud computing services are right at the cutting edge of digital technology, allowing organizations large and small to streamline their operations and improve efficiency. These services, also known as 'the cloud', have since their inception been at the forefront of the digital revolution, with each iteration bringing an ever-expanding range ... Read More
July 8, 2018Bennet Hammer
Security_tips_you_can_act_on_today_730x365

26

Jun2018
SMBs need security measures as much as large corporations do. They aren't hard to install, and you can probably do everything you need to do in a single day. You need to secure the computers in the office, but employees should also secure their laptops and smartphones as they can ... Read More
June 26, 2018Bennet Hammer
Top_10_cybercrime_730x365

14

Jun2018
Download this helpful Infographic   Contact Us
June 14, 2018Bennet Hammer
15258401005_step_security_compliance_for_SMBs_730x365

08

Jun2018
What is security compliance? Being security compliant means your IT protocols follow prevailing local and international industry standards, as well as adhere to any laws that apply in your locality. Examples include adhering to local privacy and security of personal information laws if, for example, you record your customers’ personal and/or financial ... Read More
June 8, 2018Bennet Hammer
Theres_a_revolution_going_on_in_distance_learning1_730x365

06

May2018
More and more universities are offering full degree courses online, catering to a growing crop of students who are learning almost entirely by distance education. According to the International Association for K-12 Online Learning (iNACOL), online education is growing at a stunning rate, with kindergarten through twelfth-grade online programs expected to ... Read More
May 6, 2018Bennet Hammer