Blog

4 Mitigation Strategies for Endpoint Security

The recent, deliberate cyber attacks against U.S. organisations by Russian civilian and military intelligence services are international news. The Federal Bureau of Investigation (FBI) and Department of Homeland Security (DHS) recently issued the Joint Analysis Report (JAR) about these events.

Read More

Protect Sensitive Data with Layered Security

Malwarebytes released their “State of Malware” report for 2016 which included nearly one billion malware detections from nearly one hundred million consumer and corporate Windows and Android devices from all over the world. Over the 10-month span from January to November 2016,

Read More

Protecting Critical Systems from Compromise

Today’s malware is more than your CD drive opening seemingly on its own or a series of annoying popup windows screaming that you were hacked. Certain types of malware, such as ransomware and botnets, can cripple a business. This can

Read More

Is Your Anti-Virus Still Relevant?

In 2016, the AV-Test Institute, a leading independent service provider in Anti-Virus Research registered over 350,000 new malicious programs every day. In 2016 they found 5 new malware threats each second and as the writing of their report counted 578,702,687 malware programs.

Read More

Innovation Starts From Within

With the accelerated pace of change in the world of business, organizations need to innovate in order to remain relevant. Some tools for innovation you may need to source, others are already at your fingertips. By Keimo Edwards Innovate or

Read More

Email Archiving & Continuity

It is well accepted today that the Cloud Computing Paradigm enables Businesses (large and small) to access Generic, Shared IT Infrastructure over the Internet instead of implementing that Infrastructure on-premises themselves. It, therefore, allows Businesses to solve real technology problems without

Read More