Have you ever wondered what IT security breaches cost a small to medium business? We do, because assuring your IT systems availability and consistent performance is big part of what we do every day. From a small and medium sized business … Read More

Business has limited resources to allocate towards investment opporutnities and must make judgement calls as to where to allocate funds that will achieve a return, with a considered risk profile. Cloud solutions are not a must for businesses to operate, … Read More

Micro­­soft Office 365 is gaining significant momentum and growth. If you’re an iPhone user and have adopted Office 365, you’ll need to know how to synchronise your Office 365 mailbox with your phone. This small instructional text explains how. Firstly navigate through your iPhone’s Set­­t­­ings to … Read More

USB Keys are an extremely convenient and cost effective method of transporting data. In the business space, they are often used is with professionals, managers and executives who take their work home. They transfer the files to a USB key, … Read More

When developing a security strategy, businesses must plan to protect against not just current threats, but all threats, known and unknown. Existing Security Threats don’t go away….Many businesses and end users remain susceptible to a myriad of known attacks due … Read More

David Hinchcliffe posted a thorough article on the big 5 IT trends in business that are both disruptive and stand a strong chance of offering transformational changes in how we leverage technology to do business. David, in his article, talks … Read More

Businesses can and do gain significant benefits from tranforming with cloud business applications. Business benefit with cloud services through: Gaining advantage over the competition, Introducing capabilities that only large enterprises could previously afford, Make people and business more productive, Gaining improved TCO over traditional … Read More

Click below to read this Executive Brief by Frost and Sullivan, sponsored by IBM. Virtualization for MidSize Businesses: Keep your foot on the Accelerator

Why do businesses maintain the behaviour of buying multiple security vendor products when more cost effective, industry proven, consolidated alternatives exist? Unified Threat Management (UTM) takes away the need for complicated, mulit-vendor security implementations for most small and medium sized … Read More

We are often asked – What is a good backup? The real answer is one you have tested, know the data is there and that you can get at it. Clients often run the backup ritual on a daily/weekly/monthly basis … Read More

1 2 3 4