We’ve all heard the new phrases… the new normal, time of uncertainty, unprecedented times, pivoting, and there will be more. Nevertheless, whatever you refer to this time as… things have changed, and there will be no going back.  We have been on a journey of learning that you might not have been aware of as…

Read More

Avoiding Coronavirus scams  Online scammers are on the offensive. As coronavirus spreads cybercriminals are finding ways to take advantage of unsuspecting users.  Several schemes have emerged amid this health crisis that we should all be wary of.     Some are easy to spot. We’ve all seen the new ‘snake oil’ products that are phony cures. But there are also more sophisticated ploys, such as apps claiming to be informational, but once downloaded…

Read More

Mankind has been using passwords for centuries for controlling access to protected locations and information. Just visualize the sentry standing at their post directed to stop any unknown enemy. Since the onset of computer systems and PC’s passwords have been promoted to protecting our personal and business data. Over the years, passwords and password encryption…

Read More

It’s officially 2020! The last decade has brought us incredible technology advancements such as; 4G LTE, cloud computing, self-driving cars, virtual home assistants, smart homes, and so much more. Imagine what the next 10-years will bring! Although we don’t have a crystal ball, there’s a few things the tech industry agrees are going to see…

Read More

Wondering what’s in store for your business tech-wise in 2020?  The answer is a whole lot!  5G will begin entering the market place, expect more uses being discovered for artificial intelligence, increasing demands on hardware, updated software and many others. Next year 85% of small businesses expect their IT expenditures to stay steady or increase.…

Read More

There are multiply ways to safeguard your company’s data: Having a privacy policy followed by your employees Establish Password management Govern Internet and Social Media Usage Manage Email Usage Govern and Manage company owned mobile devices Report Security Incidents and how to respond and mitigate damage.   But none of these carefully planned policies and…

Read More