Category: Articles

29

Jul2018
Passwords are still a major security weakness. Easy-to-crack passwords can render even the most sophisticated (and expensive) security measures powerless. Yet despite this vulnerability being well known, too many of us persist with passwords that are weak, easy to guess or repeated across multiple log-ins. It's understandable: most users struggle to remember ... Read More
July 29, 2018Bennet Hammer

08

Jul2018
Cloud computing services are right at the cutting edge of digital technology, allowing organizations large and small to streamline their operations and improve efficiency. These services, also known as 'the cloud', have since their inception been at the forefront of the digital revolution, with each iteration bringing an ever-expanding range ... Read More
July 8, 2018Bennet Hammer

26

Jun2018
SMBs need security measures as much as large corporations do. They aren't hard to install, and you can probably do everything you need to do in a single day. You need to secure the computers in the office, but employees should also secure their laptops and smartphones as they can ... Read More
June 26, 2018Bennet Hammer

14

Jun2018
Download this helpful Infographic   Contact Us
June 14, 2018Bennet Hammer

08

Jun2018
What is security compliance? Being security compliant means your IT protocols follow prevailing local and international industry standards, as well as adhere to any laws that apply in your locality. Examples include adhering to local privacy and security of personal information laws if, for example, you record your customers’ personal and/or financial ... Read More
June 8, 2018Bennet Hammer

06

May2018
More and more universities are offering full degree courses online, catering to a growing crop of students who are learning almost entirely by distance education. According to the International Association for K-12 Online Learning (iNACOL), online education is growing at a stunning rate, with kindergarten through twelfth-grade online programs expected to ... Read More
May 6, 2018Bennet Hammer

22

Apr2018
'Shadow IT' refers to apps and services that are in use by members of an organization but not under the control of the IT team. An example might be a team setting up its own Dropbox or Google account to manage documents, or even using more advanced, typically online services ... Read More
April 22, 2018Bennet Hammer

05

Apr2018
AR and VR set to transform business processes Virtual reality (VR) and augmented reality (AR) are already altering how the business world functions in ways that would have seemed unimaginable a decade ago. Yet anyone with more than a passing interest in the technologies understands that we are currently experiencing the ... Read More
April 5, 2018Bennet Hammer

28

Mar2018
Data, analytics, and you Data, and especially big data, is a big deal in business circles, with a promise to help you make smarter decisions based on hard evidence. But can a small business also benefit from the insights that big data promises, or is it only something larger companies can leverage? ... Read More
March 28, 2018Bennet Hammer

26

Mar2018
One of the few industries that will never see budget cuts is security – especially cyber security. As the world grows ever more complex and connected, our valuable information is increasingly exposed to malicious actors from all corners of the globe. However, there are experts working behind the scenes to fight ... Read More
March 26, 2018Bennet Hammer