The blockchain is unquestionably an ingenious invention – the brainchild of a person (or group of people) known as Satoshi Nakamoto. But what has been a way of facilitating transactions within a dark world of illicit activities, is now being looked at by conventional businesses. Companies like Toyota, UnitedHealth Group and Fidelity are exploring blockchain technologies as a way of streamlining operations and cutting costs. By doing so they are giving legitimacy to the space, and motivation for other companies to investigate blockchain options as well.
Wearable technology such as Google Glass, Apple's iWatch and Samsung's Galaxy Gear smartwatch is beginning to gain traction with consumers. What seemed too futuristic only a few years ago is now becoming mainstream. But is there a role for wearable tech in business? And more importantly, can your company gain an edge by introducing wearable tech? The short answer is yes; our business IT experts explain.
The WannaCry Cyber Attack has made worldwide news over the past few days. And as a Managed Service Provider with expertise in IT security, we have received a lot of questions about the details of the attack and what businesses can do to protect themselves. Below is our WannaCry cheat sheet, providing a quick overview of what happened.
This is a guest blog from Wendy Zamora at Malwarebytes, first published here.
Approximately one million people have had their Gmail account accessed by a phishing scam involving a Google Docs email yesterday.
It used to be that a good security system and a building with a manned gate kept businesses safe. Employees with key cards and CCTV surveillance were icing on the cake. Sensitive files were kept under lock and key in discrete locations, and security companies were hired to do drive-bys at night. We live in a whole new world though, and as BTA sees regularly, businesses need an entirely different type of defence to stay safe today. The latest research reveals that companies are still not addressing basic IT security issues, and cyber attacks are increasing faster than ever before. Companies, it would appear, are not fully understanding their vulnerabilities, or choosing not to do anything to address them.
If all your communications mediums work together seamlessly, you are more efficient. You can work more, and with less effort. This is why businesses are investing in unified communications technology. Luckily if you regularly use a Windows 10 PC and an Android phone or tablet, there are several free Android apps you can install that can seamlessly link the flow of information between the two, putting you firmly aboard the unified communications train, without any additional cost.
Most of us know how to do the basics in Microsoft Word—bold text, copy, paste, create bullet points and change font size. But few of us have ever been shown how to use Microsoft Word features that could make our documents that little bit more professional, or help us do things that little bit faster. Below our IT consultants give you their top 5 essential tips for Microsoft Word 2016 for a professional edge.
A few weeks ago, the world celebrated International Data Privacy Day. The goal of the day is to draw attention to all the personal information you own, and make sure it is secure as it can be. Most of us know to strengthen passwords and log out of sensitive accounts, but not many people know how to spot a fake app. And with apps for everything these days, knowing the difference between a real app and a fake app may prove to be a very useful skill indeed.