Blog

January 29th, 2015

Security_Jan28_CThink your security is taken care of with a frequent anti-virus scan? Think again. While we’ve all become used to the idea that viruses, worms and other malware - however much disruption and damage they cause to our systems - can be detected and removed thanks to the tracks they leave as they create havoc, that’s no longer something to count on. Proving the point is Poweliks, an invisible trojan horse that evades being picked up by anti-virus software. Read on to find out all you need to know about Poweliks and how to fight it.

What is Poweliks?

Security firm Symantec describes Poweliks as a trojan horse that performs malicious activities on the compromised computer. But it’s no ordinary trojan - unlike the majority, which infect your computer with malicious files, Poweliks is a silent and invisible threat that hides away in the memory registry of your system. It’s not entirely new for a virus to seek to cover its tracks by making itself "file-less" but, in contrast with Poweliks, most are wiped when you restart your computer and its memory is cleared. Worse still, Poweliks hijacks the legitimate processes and applications running on your network, inserting its code into them where it can largely evade detection.
Read more.
Topic Security
January 22nd, 2015

socialmedia_Jan20_CRegardless of the industry in which you operate, it’s undeniable that social media has become an essential platform for many businesses of all sizes to easily engage and interact with customers and potential customers, as well as boost visibility. But there’s more to social media than market reach and penetration and it can prove to be a powerful tool for driving dynamic business development too.
Read more.

Topic Social Media
January 14th, 2015

Security_Jan12_CThe scale of the recent security breaches at Sony, which led to the cancellation of The Interview’s theatrical release, can make the company’s problems seem beyond the realm of the average small business. But the security mishaps that created the circumstances for the hack are as applicable to modest local and regional companies as they are to multimillion dollar corporations. These three tips will take you back to security basics and help avert your own big-screen drama.

Don’t let basic security habits slip

Our modern-day instinct tells us that the answer to potential security breaches is to install new layers of antivirus software, firewalls and further encryption systems. While these are all worthy additions to your company’s armor of security shields, they will do little to help if good old-fashioned protective habits are allowed to slide.
Read more.
Topic Security
January 1st, 2015

hardware_Dec25_CAn antivirus scanner is one of the most essential parts of any security plan. These useful programs scan computers and systems for potential infections and get rid of them, ensuring your files and systems are safe. Because many of these protection programs are subscription based however, it can be easy to let the validity expire. If this does happen, is it really such a big deal though?

What happens when an antivirus subscription expires?

While each program will treat an expired subscription slightly different, generally speaking, most will still function in some way. You will normally be able to run a scan, but you likely won't be able to deal with any malware or security threats. Features like automated scanning will also be turned off.
Read more.
Topic Hardware
December 31st, 2014

security_dec24_CWhen looking into the ways companies are hacked, you quickly realize that there are so many different tactics out there that it is mind-boggling. One of the more effective methods used recently is spear phishing, and in early December 2014, a new spear phishing attack was uncovered. This threat, while directed at larger organizations, could be turned against smaller businesses as well, and is therefore worth you knowing about.

What is spear phishing?

Spear phishing is an advanced form of phishing where attackers troll the Internet for relevant information about you and then create a personalized email that is sent to you. This email is usually developed so that it appears to be coming from a friend or trusted partner and contains links to a site or program that can initiate an attack or steal information.
Read more.
Topic Security
December 30th, 2014

BCP_Dec23_CThere are many different backup solutions out there available to small and medium sized businesses. While most owners are aware of the fact that any backup solution is important for a Disaster Recovery Plan, it can be tough to pick the right one for your business. One of the most popular is online backup. If you are considering which backup solution to choose then our overview should help you decide.
Read more.

December 23rd, 2014

thJP Morgan Chase, the largest bank in the nation, revealed that 76 million household accounts, along with 7 million business accounts have been compromised in a cyber-attack.
Read more.

Topic News
December 18th, 2014

SocialMedia_Dec15_CMeasuring the overall success of a marketing campaign is often dependent on a number of metrics. When it comes to measuring the success of your social media campaigns, the most common metric employed is the number of shares. Companies who post content online often find it difficult to get their content shared through. If this resonates with you then here are four common reasons as to why your content might not be be shared and what you can do about that.
Read more.

Topic Social Media
December 11th, 2014

BusinessValue_Dec11_CAs the new year has approached, stress levels go up within businesses. There is often the pressure to finish reports and budget for the new year, not to mention that there was probably extra expenditure requirements during the past holiday season too. This is also the time when many businesses begin to look for newer business systems that are not too expensive. To help, here are some free or affordable solutions that could make your business run far easier.

Read more.

December 11th, 2014

VoIP_Dec11_CDecember is one of the busiest months for many businesses, especially those in the service industry. Because of this, you will likely see an increase in call volume and you need to make sure that your VoIP systems are ready to cope with this boost. To ensure that your calls sound clear you might want to follow these useful VoIP system tips.

Establish VoIP system monitoring

Before you know whether your systems are ready for an increased call volume, you should establish monitoring tools that allow you to keep track of call volumes and how the systems hosting your VoIP solution are faring. If you notice that a spike in call volume during peak hours leads to decreased call quality, or perhaps an increased load on systems, then it may be a good idea to invest in a new solution that can help carry this extra burden.
Read more.
Topic VoIP General