Recent Posts

Categories

See all

Email Newsletter

outsourceIT Blog

Chimera ransomware: what to know

December 29th,2015 outsourceIT

You are probably already familiar with ransomware, one of the nastier forms of malicious software that does the rounds every now and again, but what you may not already be acquainted with is a ransomware program called Chimera. Only recently discovered, Chimera’s creators have taken the already unpleasant ransomware program’s scare ...

Read More

Potential IT security issues in 2016

December 28th,2015 outsourceIT

As a small or medium-sized business owner or manager, it’s only to be expected that you want to keep your company safe from cyber attacks and hacking attempts. But how much do you really know about online safety? With massive corporations such as Sony falling victim to attack, cyber security has never been more in the public eye. And ...

Read More

Using big data to increase profit

December 25th,2015 outsourceIT

Pushing the envelope, thinking outside the box, keeping someone in the loop. All of these phrases, and countless more, have had their turn in the corporate spotlight. Thankfully now, in most working environments, they have been consigned to history. However, one buzzword is making the rounds at the moment and - unlike some of its ...

Read More

Adding value to a business with data

December 23rd,2015 outsourceIT

It’s one thing to look at and collect your business’s data, but how do you actually go about turning that wealth of information into something meaningful you can use as a force to propel your organization on to bigger and better things? Data mining can be a daunting task, and may well make a regular appearance at the very bottom of ...

Read More

A guide to interruption insurance

December 22nd,2015 outsourceIT

Twitter’s cyber attack warnings

December 18th,2015 outsourceIT

While a small number of Facebook and Google users have, in the past, been warned that their accounts may have been hacked into by something called a “state-sponsored actor”, users of social media platform Twitter have largely escaped unscathed by the phenomenon. Or at least they haven’t been told about it. Until now, that is, for ...

Read More

How Google protects users with safe browsing

December 17th,2015 outsourceIT

As end users of Google’s suite of productivity enhancing tools, we have a right to know that the company is doing everything in its power to protect its billions of users - whether they are working from a desktop, browsing while they are on the go, or working remotely. But what measures has Google put into place to keep its legions ...

Read More

When do you need your BCP?

December 12th,2015 outsourceIT

Having a Business Continuity Plan (BCP) is great, but only if you know when it needs to be invoked. If you don’t know when it should take effect, then you might as well not have one at all. While a lot of business owners might believe it is pretty obvious when a BCP needs to be invoked, the process is not always so cut and dry. So ...

Read More