Blog

How to successfully find a great VA

November 1st, 2012

There are many different ways you can virtualize your company. Many companies virtualize the easier tech related functions like desktops, telephone and sales. Virtualizing systems like these are great at making specific jobs easier, however they don’t make it easier to stay on top of things.

What security threats should I focus on?

October 26th, 2012

Security is a big issue, and big business for many IT companies. There are always security threats, and according to media outlets, most security threats are coming from highly advanced groups capable of launching incredibly complex attacks that bring widespread technical devastation.

Report highlights DR in Asia

October 25th, 2012

There are many reasons as to why you would spend time developing a Disaster Recovery Plan (DR) that fits your company. The biggest reason is because it will help during times of disaster, and could be the difference between your business failing or succeeding.

Don’t make these 5 LinkedIn mistakes

October 17th, 2012

Social networking has become an integral part of the fabric of modern society. There are more social networks than you can count, all offering a network usually aimed at a niche market. One of the more popular networks is LinkedIn. Geared towards professionals, LinkedIn is a great tool that can help you in many different ways.

Do you secure your online identity?

October 12th, 2012

Theft has been going on nearly as long as there has been life on Earth. When the Internet was invented, theft was digitized and, one can argue, that’s where it really took off. One of the more common types of online theft revolves around criminals stealing online identities and there’s big business in people’s personal information.

Woz comments on all the neat clouds

October 4th, 2012

The cloud is here to stay, at least for the foreseeable future. Some pundits are forecasting that nearly all essential systems will be cloud based in the next five to ten years. It definitely looks that way, as many big software companies already have cloud based services.

Computer infection terminology and you

September 28th, 2012

If you read any technical blog, including ours, on a regular basis you are bound to come across a fair number of security related articles talking about security flaws, worms, viruses, Trojans and all manner of nasty sounding programs. With a large selection of malicious software out there, it can be tough to tell the difference between a virus and worm.

Ensure your DR plan is ready to fly when needed

September 27th, 2012

Disaster Recovery (DR), the act of ensuring that your systems and departments are ready for a disaster and that your IT systems can recover from it, is an important issue for all companies. While large companies with operations in more than one country can often bounce back quickly, small to medium businesses in the disaster area might have a tougher time, Ensuring a DR plan is reliable is necessary for small to medium sized businesses.

Security breaches help you learn

September 21st, 2012

Apple has long been a promoter of how secure and safe their products are, many of which are more than some of their competitor products. This is changing however; two recent high profile incidents have showcased that Apple does have some security issues it needs to work on.