Security Is the government really spying on you?

Is the government really spying on you?

Wikileaks, the website that anonymously publishes leaked information, recently released a number of documents alleging widespread surveillance by the US government. The released documents claim that the vast majority of these efforts took place via smartphones, messaging apps and…TVs? Let’s see just how worrisome they really are. What devices and apps are supposedly vulnerable? Wikileaks labeled its ongoing release of …

Vulnerabilities on WordPress websites

Vulnerabilities on WordPress websites

“Easy-to-use,” “SEO-friendly,” “open-source,” and “customizable.” These are some of the words that best describe WordPress websites, currently the most popular Content Management Solutions (CMS) platform. With thousands of websites affected in a recently launched series of attacks, “easy to target,” “hackers’ favorite,” and “prone to attacks” could soon be used to define the experience of running a WordPress website. WordPress …

The state of web services in 2017

The state of web services in 2017

It’s 2017, and it’s time to start thinking about what information technology will look like for the rest of 2017 and going forward into 2018. That could mean anything from forecasting the costs of adopting new technology to upgrading your products to better integrate with new trends. Whatever it may be, we’re putting down our predictions for how to get …

Web Monitoring

How web monitoring increases productivity

The internet is undoubtedly one of the most powerful tools for improving business productivity. But it’s also a magnet for procrastination. With unfettered access to the internet, it’s easy to stray away from your important work responsibilities. If done in moderation, five-to-ten minute breaks on Facebook, Twitter, and YouTube are harmless, but if employees spend several hours a day there, …

Social engineering

Social engineering and cyber security

Social engineering is the ability to manipulate people into wilfully giving up their confidential information. The data varies, but in terms of cyber security this usually means passwords and bank information. Criminals are using social engineering to gain access to your business and its network by exploiting employees who often don’t have a clue about what is happening. Avoiding it …

Choosing a cloud provider

Many businesses are now looking towards “cloud computing” to provide them with the IT systems and services that they would have previously had in their office.   Cloud computing encompasses many different technologies and services with a huge variety of “as a service” providers.  This presents a considerable number of challenges for businesses over security, reliability, backup, performance and costs as …