Why Your Business Should Consider a Hosted Desktop Solution

Nicholas WestgateBlog

Does it make sense to keep replacing PCs as they age, or should you migrate to a Hosted Desktop solution? What is a Hosted Desktop anyway? In this week’s blog post we’ll attempt to answer those questions and help you come to a conclusion as to why your business should consider a hosted desktop solution. First, let’s explain what a … Read More

Cyberattacks, Phishing, and Ransomware

Nicholas WestgateBlog

Cyberattacks, Phishing, and Ransomware

Cyberattacks. Phishing. Ransomware. These words sound like something out of a science-fiction movie, but as we face the ever-growing challenges of Cyberattacks, “Phishing and Ransomware” are becoming much more commonplace. According to the Webroot Quarterly Threat Trends September 2017 report,  Phishing is the number one form of Cyberattack, and in 2016, 93% of Phishing attacks led to Ransomware. What does this mean? It … Read More

New Year’s Resolutions for Small Business Tech

Nicholas WestgateBlog

10 New Year’s Resolutions for Small Business Tech

Every year we make resolutions to improve ourselves: lose weight, travel the world and become more technically savvy!  Okay maybe the last one didn’t make your list but it should!   Here are some New Year’s resolutions to improve your use of technology, protect your data and help your business be more productive in 2018 giving you more time to look … Read More

Secured Connection Vulnerabilities on Apple Devices

Paul MorganBlog

apple security flaw

Are you like most of us and own and use an Apple device (phone, laptop, or tablet)? Unfortunately, an extremely concerning security flaw has been reported that’s so bad that developers won’t even discuss details (to prevent giving hackers insight into how to exploit the hack). The security flaw affects SSL/TLS connections for the devices, which normally prevent eavesdropping on … Read More

Cryptolocker: A New Era of Ransomware

Paul MorganBlog

ransomware

A particularly nasty new “ransomware” virus has started to appear on the radar of security companies at the end of mid-September. Cryptolocker, as it was later coined, amazed security experts with the innovative way it extorts money from the targets that it infects using unbreakable, industry standard file encryption. What does it do? When infected, Cryptolocker causes your machine to … Read More

Computer Viruses – Who, What, How and Why

Graham CaparuloBlog

virus-detected

Some of the most common questions that we hear from customers revolve around computer viruses: “How did I get this virus?”. “What exactly is a virus?”. “Who writes them and why?”. So, in the post, I’ll focus on the How, What, Who and Why of viruses. As a follow up post, I’ll talk about what you can do to protect … Read More