Mental shifts to make before cloud migration

Productivity, collaboration, freedom. These words are often touted when the benefits cloud technology are mentioned. But do all businesses that make the cloud switch achieve these? Unfortunately the answer is no. Some businesses flounder in the new technology, and some even become less productive because of it. So how can you avoid such a fate? […]

Is your continuity plan doomed to fail?

Just because your IT provider has a plethora of awards and certifications under its belt doesn’t mean that you can blindly hand over your business’s future to them. Often times, there are some aspects in your business continuity plan that tend to be overlooked by your provider. We have rounded up some of these issues […]

New security flaw in popular image uploader

ImageMagick, one of the internet’s most widely used image processing services, is susceptible to attacks that may put your site at a huge risk of exploitation, according to recent reports. The discovery of this vulnerability means attackers could potentially steal your site’s data, or corrupt it entirely. Let’s take a look at what your SMB […]

Microsoft’s more secure Office web service

Earlier this month, Microsoft made a huge announcement regarding Office that hasn’t received much attention. While there is a lot of interest in web-based versions of Microsoft Office, many organizations avoided the Office Online services for fear of compromising their privacy and security. However, they’ve announced a new version that allows businesses to host an […]

Finding a way into your computer

Source: www.infostream.cc

Have you ever thought that maybe having just a password to log into your computer isn’t enough to keep hackers out? Has the thought ever occurred to you that you may be leaving a ‘back door to your personal information’ wide open.

Phone app helping law enforcement

Source: www.infostream.cc

Many apple users have at some point used the ‘Find My iPhone/iPad’ app. Now it is also being used to help Police solve crimes.

The application, according to tech experts, can be used to help locate equipment and secretly follow people.