1. Do not open suspicious looking emails or click on URLs / hyperlinks in such mails. This cannot be stressed enough and is still a major reason for infection. If in doubt, delete! For businesses it is worth employing third party cloud-based email hygiene subscription services (such as our email software). These scan emails before they are delivered. They also offer features such as …
Why you should wait on the Windows 10 Upgrade
Microsoft announced that Windows 10, their latest operating system to grace the computers of this planet, will be launching and made available worldwide on 29 July 2015. As someone who uses the Technical Preview builds every day, they’re almost ready for gold status, but they’re a ways away from it, with a few remaining niggling issues to solve and some …
Protect your Personal Information
You hear about people’s hard earned money being defrauded every day and you may be scared that the same might happen to you. There are better ways to keep safe than to keep all your money hidden under your mattress. The best way to protect yourself is to protect all your personal information and keep it away from thugs. What …
Top 10 Technology Trends for 2015
The 2015 Technology Trends are very exciting as technology is advancing at a faster rate giving us even more features, security and mobility. The latest trends are focused at improving your lifestyle through various ways and means, here are the top 10 Technology Trends for 2015. 1. Computing Everywhere As smart-phone technology advances, smart-phones will be used in new contexts …
The Top 10 Benefits of Outsourcing IT through Managed Services
IT Managed Services have become more and more popular among small to medium-sized businesses. There are many reasons for the growing move towards Managed Services and below are just a few immediate benefits. 1. Control IT Costs Outsourcing gives you a fixed cost and allows you budget effectively. You are able to use as much of that contract as you need …
What You Need to Know About Creating an IT Budget for 2015
After a long period of recession, spending on business technology is now on the rise. Signs of economic recovery and a more stable operating climate have caused companies to shed their cautious approaches and spend more on IT in 2015. With Electricity supply expected to stabilize and the ever-increasing advancements and benefits of IT for companies the expected IT spend …
Windows 10 Review and Features
Multi Will be offering the Windows 10 Upgrade pack for FREE On the 21st of January 2015 late Wednesday Night in South Africa the Multi staff were glued to the Windows 10 launch live stream. After all the features and demos we all agreed that Windows 10 is a definite upgrade for everyone using a device. It wasn’t another release of something new …
5 Big Security Threats you could face in 2015
2014 was completely disastrous from a security point of view for companies and people alike. Apple’s iCloud breach saw private celebrity photos leaked, the most memorable security breach of 2014 was Sony Pictures who was thanks to a breach in Apple’s iCloud, Sony Pictures was the victim of it all but crippled the company and the public at large found itself …
Information Security Password strength is key
In today’s technologically driven business marketplace one of most often overlooked points of vulnerability to your business and personal information security is the strength or weakness of the passwords that you define for usage when logging into: your computer network, email provider, online banking, accounting or payroll applications. To underestimate the importance of strong passwords is to leave the door …
It’s time to say goodbye to Windows Server 2003
Technology is advancing at an incredible rate. Consider just how much has changed in the past 12 years, no one uses maps to get around anymore. But back when Window’s Server 2003 (WS 2003) was first released that’s how we did it. Considering what we know now and looking back, a lot of our technology, workloads and processes were inefficient. …
10 Tips for Disaster Recovery Planning
Last week South Africa experienced its worst load shedding since 2008 with R200m worth of lost revenue and damages to the country and businesses. Fortunately no one was killed or badly injured but more than 800 000 businesses were without power and most parts of the country looked more like a dead ghost town than a commercial area. With Generators catching fire and IT hardware becoming corrupt, a disaster recovery plan …
Why your company needs an Internet Policy
With computers and Internet access such an integral part of every business, and the Internet filled with everything from gambling to X-Rated websites, it is critical that every business has an Internet Use Policy in place. This policy can help prevent your employees from accidentally or intentionally causing harm to your company or your company’s reputation. While you don’t want …