5 Keys to Disaster Recovery Planning

5 Keys to Disaster Recovery Planning

According to “IT Pulse” when IT Systems fail, and employees are unable to access their files, 552 employee work-hours are lost annually. That is more than a quarter of the year for a single employee of a typical small business! So how is your Disaster Recovery Plan?...
Trojans – Devious computer viruses

Trojans – Devious computer viruses

Trojans – Inspired by the art of war Most know the story of the Trojan Horse used by the Greeks to enter the city of Troy and win the war. After 10 years of siege and nothing to show for it, the Greeks constructed a giant wooden horse and hid a small force inside....
Worms! – Just as slimy in your computer

Worms! – Just as slimy in your computer

A computer worm is a standalone malware program that copies itself in order to spread to other devices. Using networks and security flaws to gain access to its targets. Worms will often cause damage to any network they use, sometimes in the form of bandwidth usage....
Mac malware – Quietly spying on you

Mac malware – Quietly spying on you

Mac’s and Malware Mac, which is not exempt from malware infections, has caught itself a new bug. FruitFly is a malicious piece of Mac malware that has been making its way onto Mac machines for years. This malware spies on its users through the computer’s camera,...

Request a Quote

Fill in the form below and someone will contact you shortly.