Global manhunt underway to find the hackers behind WannaCry As users across the world recover from one of the largest cyber attacks in history, a global manhunt is now underway to track down those who unleashed the WannaCry ransomware. WannaCry exposed security weaknesses that had been discovered
Read more →iPhone sales slow ahead of 10th anniversary release Apple reported a drop in sales for the iPhone during the second quarter this week, surprising many people. It’s been suggested that many customers are delaying their purchase as a result of anticipation over the 10th anniversary edition of
Read more →How big is the data threat to your business? Every tech provider talks up the data threat to your business. But, it can be very hard sitting at your desk, behind your ISP or server firewall, to gauge how big this “massive threat” is to your business.
Read more →Can Microsoft Azure help your business grow? Moving from your current set up to a cloud-based solution such as the one provided by Microsoft Azure can seem like a daunting prospect, but many businesses report that they have noticed a number of operational advantages within a mere
Read more →Securing your data when it is on the move Computer security, securing your network, and data protection are all things you take seriously; and you already have a secure store for your company information and your customers’ personal data. But what do you do when you need
Read more →Business continuity vs disaster recovery planning When making contingency plans for your company, you will often be faced with the two following terms, business continuity planning (BC(P)) and disaster recovery planning (DR(P)). Sometimes they are connected together to form business continuity and disaster recovery planning BCDR. But
Read more →Patent shows Apple interest in modular hardware for iPad and iPhone A patent filed by Apple Inc that was published on Thursday by the U.S. Patent and Trademark Office reveals concept designs for a portable hardware accessory that mimics a laptop but requires an iPhone or iPad
Read more →Mobile workers represent a serious data breach risk to companies Mobile working can be a great asset to businesses of all shapes and sizes. Cloud services and the proliferation of internet-enabled mobile devices have helped make it a relatively simple matter for employees to get access to
Read more →How to successfully implement Office 365 The unspoken reality of many small and medium companies who have switched to Office 365 is that most their staff use it in exactly the same way as they used the old MS Office software packages. It looks similar, the main applications are
Read more →What’s in store for the MacBook Air in 2017? One of the most notable features of the 2016 MacBook Pro is, of course, the touch bar, advertised with the slogan ‘a touch of genius’. While the majority of Apple hardware upgrades take place under the hood, the
Read more →