previous arrow
next arrow
Slider

Blog

By Richard Walters 

Artificial intelligence has been touted as the “next big thing in cyber” for some time, even though the concept is as old as the first email viruses. The clamour around the technology, which started in late 2015 / early 2016, was quickly amplified as it became a tool in heavy

By Chris Miller

Most people know the nativity and its key characters – how Jesus came to be born in a stable to Mary and Joseph. How he was visited by shepherds, guided there by an angel, and the three wise men who arrived, following a star, each bearing a gift for the

By Amer Owaida

Yesterday, we discussed bad cybersecurity habits you should avoid in 2020, especially where computers are involved. We’re not done yet. Some of the recommendations apply to both computers and smartphones, such as being especially wary when connecting to a public Wi-Fi network. Our upcoming cybersecurity tips are more smartphone-centric. Authentication You’d

By Tyler Moffitt

The internet can be a hostile environment. The threat of cyberattack is ever-present as new vulnerabilities are released and a commodity of tools are produced to exploit them. Therefore, the pressure on organisations (and their employees) to protect customer data and defend against attacks, is mounting. But aside from using Firewalls and antivirus

By JAMES GELINAS

Was an Android device waiting for you under the tree this year? Google’s in-house operating system ignited a smartphone revolution across the world. And now, the handsets are so advanced they’re putting Apple’s top tier products to shame. Naturally, new Android users are bound to have questions. The operating system

Locations

Get a Quote

If you have questions or comments, please use this form to reach us, and you will receive a response within one business day. Your can also call us directly at any of our global offices.