Blog

What to expect from Apple in 2015

What to expect from Apple in 2015

Looking back at it, 2014 was a great year for Apple. From the iPhone 6 to iOS 8 and OS X Yosemite, along with other new products, there were many useful products and systems introduced. Now it is time to look forward to 2015 and what tech developments we might benefit from in the year ahead.

New spear phishing attack identified

New spear phishing attack identified

When looking into the ways companies are hacked, you quickly realize that there are so many different tactics out there that it is mind-boggling. One of the more effective methods used recently is spear phishing, and in early December 2014, a new spear phishing attack was uncovered.

Looking at online backup solutions

Looking at online backup solutions

There are many different backup solutions out there available to small and medium sized businesses. While most owners are aware of the fact that any backup solution is important for a Disaster Recovery Plan, it can be tough to pick the right one for your business.

Getting social media content shared

Getting social media content shared

Measuring the overall success of a marketing campaign is often dependent on a number of metrics. When it comes to measuring the success of your social media campaigns, the most common metric employed is the number of shares. Companies who post content online often find it difficult to get their content shared through.

Looking at Office 365 versions

Looking at Office 365 versions

Microsoft is one of, if not the, world’s largest software developer. One of the more increasingly popular solutions being adopted by businesses is the cloud-based Office 365. While popular, one problem many business owners face is selecting which of the many different versions to implement.

5 Useful business systems

5 Useful business systems

As the end of the year approaches, stress levels go up within businesses. There is often the pressure to finish end-of-year reports and budget for the next year, not to mention that there can often be extra expenditure requirements during the holiday season too.

Do Not Disturb silences your iPhone

Do Not Disturb silences your iPhone

Small to medium business owners have come to rely on the iPhone as one of their main ways to stay connected with the office, and be productive while working remotely. The problem is, this can lead to constant connection with business demands, which can prove to be overwhelming.

Deauthorizing devices on iTunes

December 3rd, 2014 iPad
Deauthorizing devices on iTunes

A common trend we see with Apple products is that once someone has purchased one device, they tend to purchase more. Because it is the holiday season, many people will be receiving a new iPad as a gift. If you do, you may need to deauthorize older devices in order to install already purchased apps on your new iPad.

Regin – is it really a big threat?

Regin – is it really a big threat?

Malware is a constant threat to a business’s security. However, with many malware infections we tend to be able to learn a lot about them in a very short amount of time, which weakens the power of each attack. There is a new threat called Regin however, that is leaving many security experts baffled.

Looking at 2 versions of OneDrive

Looking at 2 versions of OneDrive

Like it or not, you have probably been using cloud systems for longer than you may think. When it comes to Microsoft, there is one newer cloud app that almost all users have access to: OneDrive. However, what you might not be aware of is that there are two versions of this platform, which can cause confusion as to when they should be used and what exactly they are for.