Email Security: Get educated

By |February 27th, 2015|

Email security is in the news again with the latest Yahoo! hacking episode, but perhaps the headlines should really be reflecting the following.

Email is not secure.  It was never designed to be.

It seems counter-intuitive, but the biggest security risk to your emails is your own […]

Comments Off on Email Security: Get educated

Technology Predictions

By |February 26th, 2015|

Given how many technology predictions come unstuck, I thought that professional firms had shied away from giving predictions. Deloitte recently sent me a copy of the 2015 Technology, Media, & Telecommunications Predictions for 2015, you can find it on the web here.

Some interesting commentary around hot […]

Comments Off on Technology Predictions

Why We Image New Machines

By |February 23rd, 2015|

IT Partners re-installs Windows 7 or Windows 8.1 on new machines, so that we get a consistent client experience, known set of drivers, and only the software that we want on the machines. In our experience this lowers support calls and costs.

Some IT companies and […]

Comments Off on Why We Image New Machines

3 Ways to Protect Your Business from Malware and Security Breaches

By |January 29th, 2015|

You might have become aware of firms and home users being infected with Cryptolocker. For a better understanding of what this piece of malware does, this is a useful article.

A recent report from AIG notes that only 36% of data breaches come from malware and external attack […]

Comments Off on 3 Ways to Protect Your Business from Malware and Security Breaches