Blog

Ready for the New York Cybersecurity Regulation? Here's What You Need to Know

May 10, 2017 Sarah Challis Articles

As a response to the growing threat of cyber-attacks, last month the New York State Department of Financial Services (DFS) finalized a first-in-the-nation cybersecurity regulation.

Read More

How To Choose the Right IT Managed Service Provider for Your Business

April 12, 2017 Sarah Challis Articles

Are you struggling to keep up with changing IT needs in your business? Do you need unbiased advice to implement new technology and keep up with the evolving digital landscape? Or perhaps you’re facing strict compliance regulations?

Read More

Cybersecurity: How to Keep Your Company Safe

March 14, 2017 Sarah Challis Articles

With cybersecurity and privacy being one of the top tech challenges for organizations in 2017, it’s important to know how your company can stay safe and secure. Recent research shows that 66% of tech leaders believe that the level of internet security threats has increased in ...

Read More

How Can IT Automation Save Your Business Money?

March 01, 2017 Sarah Challis Articles

There has been massive growth in the number of IT automation tools in the past few years and the benefits are compelling; automation improves efficiency, productivity and output while reducing cost, risk and inconsistency. Automation also cuts down on repetitive tasks and ...

Read More

How Safe is Your Data in the Cloud?

February 15, 2017 Sarah Challis Articles

Cloud computingstoring data and applications remotely, rather than using your premisescan make your business more efficient, cut IT costs, and speed up operations. Many benefits come with the cloud; building energy-hungry data centers is expensive and time-consuming, while ...

Read More

Do You Need a Virtual CIO For Your Business?

January 31, 2017 Sarah Challis Articles

The Old CIO

A short while ago, the “IT guy” role in a business resembled a technical support engineer who would run when called, then diligently untangle wires and reconnect telephone lines. Back then, IT departments comprised of large computers that were located in ...

Read More

Data thieves target health care’s weak security network

November 07, 2016 Eugene Articles

The health care industry’s security system is apparently in need of major repair.

Read More

5 factors startups should consider while choosing a cloud provider

October 11, 2016 Eugene Articles

Cloud computing has a significant role to play in making startups successful. From San Francisco to London to Israel to Bengaluru, many early-stage startups utilised the cloud in rapidly scaling their businesses.

Read More

Here's what you should know, and do, about the Yahoo breach.

September 30, 2016 Eugene Articles

Yahoo’s announcement that state-sponsored hackers have stolen the details of at least 500 million accounts shocks both through scale—it’s the largest data breach ever—and the potential security implications for users.

Read More

Hackers Claim to Auction Data They Stole From NSA-Linked Spies

August 10, 2016 Eugene Articles

The NSA’s elite teams of hackers have for years made it their mission to silently compromise computer systems around the globe. Now one group of anonymous hackers claims to have executed a counter-hack with none of the same discretion: They’ve brazenly announced the theft of ...

Read More