Chimera ransomware: what to know

December 29th, 2015

You are probably already familiar with ransomware, one of the nastier forms of malicious software that does the rounds every now and again, but what you may not already be acquainted with is a ransomware program called Chimera. Only recently discovered, Chimera’s creators have taken the already unpleasant ransomware program’s scare tactics to the next […]

2016 could be the year of the phone

December 29th, 2015

There was a plethora of phone releases in 2015, but not a lot of game-changers hit the market. That looks set to change in 2016, with major players like Apple, Samsung, Microsoft and many others gearing up for major phone launches in the coming year. If it is time for a new phone, you might […]

Potential IT security issues in 2016

December 28th, 2015

As a small or medium-sized business owner or manager, it’s only to be expected that you want to keep your company safe from cyber attacks and hacking attempts. But how much do you really know about online safety? With massive corporations such as Sony falling victim to attack, cyber security has never been more in […]

Using big data to increase profit

December 25th, 2015

Pushing the envelope, thinking outside the box, keeping someone in the loop. All of these phrases, and countless more, have had their turn in the corporate spotlight. Thankfully now, in most working environments, they have been consigned to history. However, one buzzword is making the rounds at the moment and – unlike some of its […]

Ransomware: 5 Do’s And Don’ts

December 4th, 2015

I despise all forms of bullying. Perhaps the one I hate most of all is where the bully takes a personal item, snatching it from you, and refuses to give it back. It's dangled right in front of you, but held just out of reach. You'll only get it back after doing whatever the bully wants.

Answer this before office virtualization

December 2nd, 2015

We won’t waste your time asking if you know what virtualization is. Someone has probably already brought it to your attention. Maybe it was your IT department suggesting it as a way to reduce downtime, or perhaps it was a competitor bragging about how it helped their company improve its bottom line.