Blog

It’s time to redefine the word “hacker”

It’s time to redefine the word “hacker”

What do you call someone who hunts for security gaps in computer hardware and software? A hacker, right? What about someone who takes their findings to vendors to help them improve the quality of their products? There is more than one type of hacker, and understanding the difference is important.

How to keep your mobile devices safe

How to keep your mobile devices safe

Increased productivity and constant collaboration are two of the main reasons why businesses have integrated a mobile policy into their business. This means an increased use of mobile devices such as smartphones and tablets in daily operations. But as the number of mobile users continues to grow, so does the number of cyber crime.

Steer clear from these types of malware

Steer clear from these types of malware

Did you know that viruses, ransomware, spyware, and trojans are all categorized as types of malware? Having been around for decades, these cyber threats have grown both in number and intensity. Needless to say, it pays to know how each of them works as well as how to protect your business.

5 ways to protect your IoT devices

5 ways to protect your IoT devices

Just a few years ago, smart appliances seemed like novelty products for rich business owners. Now, the Internet of Things (IoT) has become a viable solution for putting your business ahead of the curve. But whether it’s a smart fridge or a surveillance camera that connects to your phone, IoT devices should be treated and secured just like any computer in a network.

Beware: Nyetya is worse than WannaCry

Beware: Nyetya is worse than WannaCry

The cyber community hasn’t fully recovered from the WannaCry ransomware attacks, which struck businesses and organizations in May. Now, a Petya ransomware variant named Nyetya is poised to join its ranks as one of the worst cyber attacks in history.

Chrome ad blocker is coming

Chrome ad blocker is coming

Chrome users have something to look forward to next year: an ad blocker. While this might not sound like the most exciting release from Google, it’s definitely a pragmatic solution to online ads that turn visitors away from the web. Here’s everything we know about Google’s ad blocker so far.

5 tips to keep the Cloud cost-efficient

5 tips to keep the Cloud cost-efficient

As a business owner, it’s essential that you are aware of the hidden costs associated with the Cloud and what measures you can take to keep those costs down. They might be more than what you’d normally pay for at first, but it could add up and cost you two, or even three times more than its worth.

Your business needs a UPS system

Your business needs a UPS system

For some businesses, power loss could result in profit loss. Natural disasters such as storms and hurricanes, construction or utility accidents, and other unforeseeable technical failures can put your business’s operations to a grinding halt. Businesses that depend on a continuous power supply to function might endure a slight disruption, but some might not.

Protect your Android mobile devices

Protect your Android mobile devices

When personal and professional informational lives on one mobile device, the risk of malware attacks and huge data breaches rises. As the adoption of bring your own device policy increases, so should employee awareness when it comes to ever-growing cyber threats.

Six new features from Android O

Six new features from Android O

Since it has just been released as a beta test, the next version of Google’s Android operating system still doesn’t have a full name and is known as “Android O” for now. What has been confirmed so far are extended battery life and an optimized notification system.