If you employ anyone aged between 16 and 19, you need to pay special attention to the cyber security training you’re giving your team.
Cyber criminals are getting smarter. This recent malware threat is unusually smart. It impersonates a highly trusted brand name to get a foot in the door.
Book now for an IT check-up, to get in great shape for the journey ahead? You do it for yourself and your car – now do the same for your workplace tech
Gen Z and even some Millennial employees are less tech savvy than many employers might expect. It’s an assumption that’s leading to a sense of ‘tech shame’.
Countless employers still don’t trust their people to do their best work unless they’re physically in the office.
With its huge dominance in the workplace, Microsoft’s Windows has become the prime target for cyber criminals.
Passkeys are set to take over from traditional passwords to give us a safer, more secure way of logging into our online accounts.
Almost half of people with social media accounts admit to falling for shopping scams. If your team are shopping at work, is your business protected?
Zoom is looking for a piece of the MS Teams action with the launch of a whole suite of features and services
Fake Flash messages are being used as a cover for a new ‘botnet’ campaign. If you use Google Chrome or Microsoft Edge you could be a target.
You could be losing a full-time working week for every member of your team, thanks to the hassle of setting up video calls.
A huge number of small and medium-sized businesses would consider using pirated software to try and save money. Don’t do it.
Do you inwardly (or outwardly) groan at the thought of yet another video call? They’re now a normal part of our working lives, but it doesn’t make them any more exciting. Good news: Microsoft is introducing Metaverse-style avatars, called Mesh avatars, to Teams. You’ll be able to design your own avatar, personalizing its appearance, accessories, and even choosing its reaction …
While Windows 11 is only just celebrating its first birthday, we’re already hearing our first rumours about what Windows 12 will have in store. There’s no rush for the time being – we won’t see this new operating system until the back end of 2024 – but we love to be ready for what’s coming next, so here’s what we know …
Microsoft Teams has fast become one of THE most useful business tools for the way we work today. No matter where your people work from, they can communicate and collaborate quickly and reliably. But this remote way of working can also open the door to some MAJOR security issues. New research shows that nearly HALF of employees frequently share confidential …
When you think about tools for remote working and chatting online, one of the first names in your mind is Zoom. But its popularity has opened the door for cyber criminals. They’re using its name to steal sensitive data. Researchers have discovered at least six convincing-looking download sites. They’re not the real thing. They’re designed […]
Microsoft has become the leader of productivity over many decades. Can you imagine doing your day to day work without their software? So it’s no surprise the tech giant recently conducted a major new survey into productivity in the workplace – and some of the results might surprise you. Researchers surveyed 20,000 people working for […]
Phishing. It seems you can’t read an article on cybersecurity without it coming up. That’s because phishing is still the number one …
Few things invoke instant panic like a missing smartphone or laptop. These devices hold a good part of our lives. This includes …
Productivity can be challenging to track, no matter where employees are working. How do you know they’re using their tools as effectively …
Cloud file storage revolutionized the way we handle documents. No more having to email files back and forth. No more wondering which …
Many small businesses make the mistake of skipping policies. They feel that things don’t need to be so formal. They’ll just tell …
One constant about technology is that it changes rapidly. Tools that were once staples, like Internet Explorer and Adobe Flash, age out. …
There is a reason why phishing is usually at the top of the list for security awareness training. For the last decade …
How many text messages from companies do you receive today as compared to about two years ago? If you’re like many people, …
You’ve completed your annual phishing training. This includes teaching employees how to spot phishing emails. You’re feeling good about it. That is …
The number of internet-connected devices in homes has been growing. It’s increased exponentially over the last decade. A typical home now has …
One of the big draws of a laptop computer is that you can use it anywhere. You don’t need to have it …
“Hybrid office” is the new buzzword you’ll hear used in business discussions. It’s the mix of having employees both working at the …
Credential theft is now at an all-time high and is responsible for more data breaches than any other type of attack. With …
Smartphones and tablets are often the preferred device for communications, web searching, and accessing many types of apps. They’re more portable and …
Approximately 34% of businesses take a week or longer to regain access to their data and systems once hit with a malware …
One of the most important applications we choose is our internet browser. When on a computer or a mobile device, we work …
While many companies have moved most of their workflows to the cloud, there is still a key component of office operations that …
When you see those people with two monitors, you may assume they do some specialized work that requires all that screen space, …
Any cyberattack is dangerous, but the particularly devastating ones are those on supply chain companies. These can be any supplier – digital …
Purchasing a new computer is a big investment. Many small businesses and home PC owners end up struggling with older systems because …
The shift to remote work over the last two years has caused companies to realign their digital tools. Now, many meetings default …
Stolen login credentials are a hot commodity on the Dark Web. There’s a price for every type of account from online banking …
Phishing is the number one method of attack delivery for everything from ransomware to credential theft. We are very aware of it …
One area of cloud computing that is used widely, but often isn’t as flashy as the software side is cloud storage. Storing …
Whether you work remotely or in an office, the line between personal and work tasks can become blurred when working on your …
In 2020, 75% of companies around the world experienced a phishing attack. Phishing remains one of the biggest dangers to your business’s …
It’s not unusual to change a mobile number from time to time. For example, when you move, you may want a number …
Over 2.4 million searches happen every minute on Google. It’s often the first stop people make when they go online. We search …
The global damage of cybercrime has risen to an average of $11 million USD per minute, which is a cost of $190,000 …
Windows 11 has been out for a few months now, beginning rollout in October of 2021. It has been largely well-received and …
Unified communications are a go-to solution for business owners looking to streamline their businesses and increase employee productivity in the long term. …
Hardly any phone call system in a business beats VoIP when it comes to efficiency and flexibility. However, it’s not immune to …
A torn-down virtual infrastructure creates risks for any business. And it can have a significant impact on how quickly you can retrieve …