customisable counter

Blog

Beware of watering hole attacks!

Beware of watering hole attacks!

Hackers have plenty of ways to breach your systems. They can use complex programs to exploit software bugs, send emails to dupe you into downloading malware, or insert a malware-infected USB drive directly into your computer. However, another increasingly popular hacking method is a watering hole attack.

3 Surprising applications of blockchain

3 Surprising applications of blockchain

Most people associate blockchain technology with Bitcoin, the infamous digital currency that rose to fame in 2017. But blockchain technology is not tied to financial transactions, and it’s creating all sorts of exciting opportunities for faster, more secure information exchange — see for yourself!

What is blockchain?

Blockchain, like the cloud, is more of a concept than a specific piece of software or hardware.

3 ways to ensure your FB data is private

3 ways to ensure your FB data is private

The public went into a frenzy when reports surfaced that Cambridge Analytica, a UK-based data analytics firm, retrieved millions of Facebook users’ private information without their knowledge. But that doesn’t mean you can’t do anything about it, and here are 3 ways to guarantee your data remains private.

How to calculate the TCO of VoIP

How to calculate the TCO of VoIP

Choosing whether or not to deploy VoIP phone systems is an easy decision. But choosing a system that works for your business can be difficult, with all the products, vendors, features, and data plans available. Oftentimes, however, selecting a VoIP system comes down to calculating the total cost of ownership (TCO).

What is TCO?
The TCO is the overall sum of procuring, deploying, and operating a VoIP system has over its life cycle, which is typically five years.

Windows 10: New accessibility features

Windows 10: New accessibility features

Microsoft is working on improvements for Windows 10’s accessibility features, which will be introduced later in the year. Some of these are already available to preview through the Insider Program, but everyone else will have to wait. Here’s what’s coming:

Better Ease of Access settings

Some users rarely tinker with their computer’s accessibility settings because they’re difficult to locate and adjust.

Ready for tax season phishing scams?

Ready for tax season phishing scams?

As tax season looms, so do phishing scams. For cybercriminals, this is the ideal time of year to deceive unsuspecting individuals into releasing sensitive private or company information. Businesses must therefore take extra precautions between now and April 17th to avoid hackers from selling your confidential data in the dark web.