by admin | Aug 31, 2022 | Blog, BYOD, Cyber security
You have very probably heard a lot about the two vulnerabilities to Apple devices over the past couple of weeks, but did you consider how it would affect BYOD? If your company has a Bring Your Own Device (BYOD) policy and have iPhones, iPads or Macs using your...
by admin | Aug 24, 2022 | Blog, Cyber security
Multisite networks were developed to tackle two key business challenges. The first, to securely connect geographically diverse locations. The second, to provide that connection without the expense of private leased lines. Leased lines are great in some situations and...
by admin | Aug 9, 2022 | Blog, Connectivity, solutions
Business use of data is on the rise and set to keep rising for the foreseeable future. The data we generate and communicate requires a reliable system that can deliver the bandwidth you need with the security you demand. Enter IP-VPN. IP-VPN stands for Internet...
by admin | Jul 19, 2022 | Blog, Web Hosting, Websites, Wordpress
WordPress is an amazing content management system but it’s only as good as the server hosting it. Like a car’s performance is dependent on the engine driving it, a website is the same. WordPress is the car but the web host is the engine that delivers the performance....
by admin | Jul 19, 2022 | Blog, Web Hosting, Websites, Wordpress
WordPress is an incredibly popular system for building websites. It’s free, flexible and infinitely scalable, which is great news for businesses with big ambitions. WordPress powers 41.2% of all websites, over 455 million of them at last count, so you’re in good...
by admin | Jun 6, 2022 | Blog, Cyber security
A zero-day bug called ‘Follina’ is actively exploiting installed versions of Microsoft Office. The vulnerability has been spotted in the wild being used by Chinese hackers to target the Tibetan community. This flaw is about much more than just politics though. It...