Secure your business printers to avoid getting hacked

To achieve foolproof cybersecurity, you must make sure that every endpoint is protected from threats. That means securing every network,…

Hackers come in all shapes and sizes

Hackers are known by the general public as cybercriminals, especially with so much news about nude celebrity photos beings released…

Do honest working hackers exist?

The word “hacker” conjures up an image of a hoodie-wearing basement dweller that programs all sorts of malicious attacks to…

4 BYOD security risks you should prepare for

Personal computing is with us wherever we go. Thanks to the rise of the mobile industry, smartphones and tablets allow…

Are all hackers out to do harm? Not so fast

Newspaper headlines and Hollywood movies have influenced our understanding of computer hackers, but in the real world it’s not so…

Potential IT security issues in 2016

As a small or medium-sized business owner or manager, it’s only to be expected that you want to keep your…