×
Menu
Search

Category Archives: Blog


Sep 06

Backupify…….

Have you moved your email and collaboration to Office 365 or Google Apps? If so, do you know if your data is protected? The truth is that even data in cloud-based apps are vulnerable to: Damage to viruses or ransomware Deletion of end-users Errors such…

+ Read More
Aug 19

Passwords, and You!

Passwords.  Everyone has them and most probably don’t follow secure-password methodology.  Have you ever used “password” as your password?  Have you used the same password for multiple logins?  When was the last time you changed your passwords?  If you answered “Yes” or are unsure to…

+ Read More
Aug 12

Social Engineering

SOCIAL ENGINEERING Today, I am going to be writing about social engineering, and a couple of the main social engineering strategies that are used everyday. One of the top strategies of social engineering would be one that is used everyday more often than you may…

+ Read More
Jul 12

Buying a New PC for Business?

  I often get asked for my opinion on what brand or processor is best along with whether or not to get a laptop or desktop. On the other hand, I hardly ever get asked about which edition of Windows to choose. I’m not talking…

+ Read More

Categories

Archives

Get in Touch

Please fill out all fields marked with * and submit the following form to request your consultation.

  • This field is for validation purposes and should be left unchanged.