Is your password secure?

Thursday, 13 February 2014 by

The number of accounts and websites we have to log in to is growing, and will continue to do so for the foreseeable future. One downside of this increased activity is that security breaches will also continue to rise as well. When it comes to security, often the weakest points are the passwords people use.

The importance of data security

Saturday, 08 February 2014 by

Recently, a server of a Texas health-care system was hacked, compromising the protected health-care records of approximately 405,000 individuals. The three-day attack, which took place in December of 2013 at the five-hospital St. Joseph Health System in Bryan, Texas, was one of the largest HIPAA security breaches ever, according to Department of Health and Human

One of the first steps many companies take when they are looking to secure their computers and networks is to implement an anti-virus or malware program and scanning. While this will go a long way in deterring network intrusions, malware can still sometimes find a way to get onto your systems. In order to minimize

4 tips to minimize malware

Friday, 08 November 2013 by

Over the past three weeks a new and potentially harmful piece of malware has come to light. The CryptoLocker virus can lock files and will hold them for ransom. If you don’t pay, your files will be deleted. It’s highly likely that this is the most destructive piece of malware of the year, and has

Business is becoming increasingly complex, with the majority of systems and data now being stored online or on a computer. Because of this, a disaster such as one that knocks out power or even destroys your equipment could be devastating. Disasters put all business data at risk and that’s why so many businesses take steps

Small business owners often have a tough job. As the face of the business you will be held largely accountable for anything your business does, or anything that happens to your business. If there is a security breach of your systems and personal information is stolen, you will asked questions as to why. Therefore, it

Cloud – 5 common myths

Tuesday, 01 October 2013 by

One of the most common tech related terms of the past half decade or so is the cloud. It seems like nearly every software developer and vendor offers cloud-based solutions that will change the world – or at the very least how you work. The cloud is definitely useful, but there are some common myths

The BYOD (bring your own device to work) trend has many benefits. Employees are happier when they’re using their own computer devices, and they also tend to be more productive because they can use their device to work outside of the office. They like the flexibility it provides them when using their own smartphones, laptops,

The data on your computer includes your documents, music, photos, videos, contacts, and software. Modern computer hard drives are able to hold enormous amounts of data, which makes the consequences of data loss potentially disastrous for a business. Does your organization regularly back up your data? If not, it’s important to start backing up your

There are many advertised benefits of cloud computing, such as scalability, cost reduction, and storage on demand. While these points help to showcase the advantages of using virtualized data centers or third-party services, they don’t reveal all of the benefits. Once the agreement has been signed, and your systems and processes are set up with

TOP