Articles

  • Windows 10 – coming on 29 July 2015

    Reserve your free upgrade to Windows 10 when it comes on July 29, 2015. Upgrade offers Yes, it’s free! This upgrade offer is for a full version of Windows 10, not a trial. 3GB download required. To take advantage of this free offer, you must upgrade to Windows 10 within one year of availability. Once […]

  • Antivirus software are not foolproof

    AntiVirus Software, Firewalls, Spam Filters, etc, etc, etc. These software and hardware have become a necessity in any modern computing environment. Can any corporation afford to be without it ? I think not. The variety of these software is growing daily, each purporting to be better than the other. Is there really one that is […]

  • Antispam measures – how far do you go?

    It’s a common complaint – “We have antispam software, so why do we still receive spam ?”. It’s simple really – antispam software is mostly playing catch up most of the time. In spite of regular updates to signature files and heuristics rules, the simple fact of the matter is, antispam software is no match […]

  • Cloud Computing: Pros and Cons

    What is Cloud Computing? With Cloud Computing, IT resources such as servers, storage, applications and etc are available as a service to business & individuals through the Internet or private network. The cloud provider provides the hardware, software, data storage, applications and infrastructure, and the user simply connects to them via the Internet. Some popular […]

  • BYOD And Policy Recommendations

    “Bring Your Own Device” or BYOD is a complex can of worms – anyone who does not think so obviously have not been in a position to either support it, secure it or balance out who pays for what, whether they are running only remote desktops, local apps, etc. From a recent Gartner Survey, IT […]

  • Security Advice: Microsoft IE – Zero-day flaw

    The following information was emailed to our clients on Friday morning, 2nd May 2014: Please be aware, if you have not already heard, that there is a new Zero Day flaw discovered that affects all versions of Internet Explorer from version 6 upwards. This zero day exploit (with the official name of CVE-2014-1776) allows hackers […]