Learning from the Ashley Madison hack

The Ashley Madison hack is simply the latest case of a big time company having valuable data stolen. It’s a trend that shows no signs of subsiding, so you would be foolish to not pay attention to it. Want to know what your business should learn about security from this scandal? Here are three important…

Challenges in implementing a BCP

Ensuring the implementation of effective business continuity planning (BCP) is an essential requirement for organizations today. Disasters strike at the most unexpected times and, when they do, you need to be prepared for the worst. While most organizations recognize the importance of BCP, their ability to execute a successful implementation is limited by certain challenges.…

Unveiling Nexus 9

It’s been nearly five years since the very first Nexus was released; and now Google rolls out its latest tablet, the Nexus 9. With a much anticipated new Android OS, the Android 5.0 Lollipop, many are wondering if our first taste of it will be as sweet as it sounds, and if features in the…

Now two-factor authentication is easy

With cyber attacks becoming more and more common, using a single password to logon to online services is becoming a less effective security measure. Enter two-factor authentication. However, those who’ve used this security process know how much of a hassle it can be – adding additional time to every single login. But not any longer.…