10 Unnerving Facts About Cybercrime During The Covid-19 Pandemic

2020 has had no shortage of difficult headlines. The pandemic has touched our lives in..

Read more

How to formulate a disaster recovery plan

What do you think of when you hear the word ‘disaster’? Perhaps it is an earthquake, or a wildfire,..

Read more
registration

Multi Factor Authentication: What it is, why you need it & how to use it.

These days, passwords are no longer being viewed as the most secure way to protect an account...

Read more

Remote Desktop Service vs VPN: What is best for your business?

Since the start of the Coronavirus pandemic, we have seen a huge move towards the use of remote..

Read more

The end of Privacy Shield: What does it mean?

On July 16th, The European Court of Justice (ECJ) officially declared that the EU-US Privacy..

Read more

5 ways to secure remote working

2020 has been a turbulent year. The COVID-19 pandemic has caused major disruption to the global..

Read more

How to conduct an IT audit in-house [+Free Template]

The word ‘audit’ is often enough to strike fear into even the most resolute business owners. What..

Read more

5 cyber security trends to look out for in 2020

2019 was an interesting (and eventful!) year for cyber security. Breaches were hitting the..

Read more
cloud cctv dome camera

How does Cloud CCTV Recording work?

In a previous blog, we discussed Cloud CCTV and how it works for businesses. We discussed how Cloud..

Read more
Cloud CCTV Cameras

What is Cloud CCTV and how does it work?

The Background We are all familiar with Closed-Circuit Television (CCTV). It has been around for..

Read more