Fantom: the latest cybersecurity spectre

Fantom: the latest cybersecurity spectre

It’s hard to deny how quickly the different types of ransomware multiply — they do so faster than rabbits during mating season. Ransomware vary in appearance, subtlety, and targets. The latest addition to the extensive list of ransomware varieties is Fantom.

How to reduce data usage for Android devices

How to reduce data usage for Android devices

What happens when the data well runs dry? Your 2, 3 or 4 gig plan is out, and then what? While you’d probably rather not think about it, we all know you’re either forced to use a slower connection or connect to the Internet through Wi-Fi. Certainly this is not the worse thing that could happen to you, but for many Android phone users it’s a scenario you want to avoid at all costs.

BI is for small businesses too

BI is for small businesses too

Business Intelligence (BI) has conventionally been the preserve of big business, given the need for specialist knowledge meant hiring pricey experts was often the only way to leverage its value. But the rise of self-service BI tools has leveled the playing field, allowing small- and medium-sized businesses to get in on the game too.

IT Security Policies you need to implement

IT Security Policies you need to implement

Most business owners have an employee handbook. But when it comes to the online security of their business, often times this portion is either not adequately addressed, or not addressed at all. However, with cyber crimes an ever increasing threat, and the fact that employee error is one of the most common causes of a security breach, it is incredibly vital that your staff is informed of your policies.