New spear phishing attack identified

New spear phishing attack identified

When looking into the ways companies are hacked, you quickly realize that there are so many different tactics out there that it is mind-boggling. One of the more effective methods used recently is spear phishing, and in early December 2014, a new spear phishing attack was uncovered.

Looking at online backup solutions

Looking at online backup solutions

There are many different backup solutions out there available to small and medium sized businesses. While most owners are aware of the fact that any backup solution is important for a Disaster Recovery Plan, it can be tough to pick the right one for your business.

Changing Chrome tabs in Overview

Changing Chrome tabs in Overview

Google’s Android 5.0 has finally been released and many devices are starting to be upgraded. With the update comes a new layout and a number of new features, including a tweak to the way open and recent apps are handled. Dubbed Overview, this development offers enhanced views of open and recent apps.

Getting social media content shared

Getting social media content shared

Measuring the overall success of a marketing campaign is often dependent on a number of metrics. When it comes to measuring the success of your social media campaigns, the most common metric employed is the number of shares. Companies who post content online often find it difficult to get their content shared through.

Using the PAR structure in emails

Using the PAR structure in emails

Email is now the most essential form of communication in business. Over the years, email has become much more informal than when it was first introduced. Sure, this makes it feel more natural, but there can be times when this casual style leads to misunderstanding, and in turn this can lead to lost productivity.

5 Useful business systems

5 Useful business systems

As the end of the year approaches, stress levels go up within businesses. There is often the pressure to finish end-of-year reports and budget for the next year, not to mention that there can often be extra expenditure requirements during the holiday season too.

Prepare VoIP for the holidays

Prepare VoIP for the holidays

December is one of the busiest months for many businesses, especially those in the service industry. Because of this, you will likely see an increase in call volume and you need to make sure that your VoIP systems are ready to cope with this boost. To ensure that your calls sound clear you might want to follow these useful VoIP system tips.

Do Not Disturb silences your iPhone

Do Not Disturb silences your iPhone

Small to medium business owners have come to rely on the iPhone as one of their main ways to stay connected with the office, and be productive while working remotely. The problem is, this can lead to constant connection with business demands, which can prove to be overwhelming.

Deauthorizing devices on iTunes

Deauthorizing devices on iTunes

A common trend we see with Apple products is that once someone has purchased one device, they tend to purchase more. Because it is the holiday season, many people will be receiving a new iPad as a gift. If you do, you may need to deauthorize older devices in order to install already purchased apps on your new iPad.

Regin – is it really a big threat?

Regin – is it really a big threat?

Malware is a constant threat to a business’s security. However, with many malware infections we tend to be able to learn a lot about them in a very short amount of time, which weakens the power of each attack. There is a new threat called Regin however, that is leaving many security experts baffled.