-
Hello world!
Welcome to WordPress. This is your first post. Edit or delete it, then start writing!
-
The Corona Virus Pandemic
As the world comes to grips with the coronavirus pandemic, the situation has proven to be a blessing in disguise for threat actors, who’ve taken advantage of the opportunity to target victims with scams or malware campaigns. According to a new report published by Check Point Research, today hackers are exploiting the COVID-19 outbreak to […]
-
Support Tools for Parents with Children
We understand that parents are dealing with school closures and childcare challenges while juggling work responsibilities and deliverables. Full-time parenting plus full-time working all at the same time can be difficult so we have compiled a list of ideas and tips that have been crowdsourced from different places to help you keep yourself and them […]
-
How to create a security policy for your SMB
Many successful SMBs have developed a formal, documented IT security policy to govern operations both in their offices and in the field. These policies educate employees and guide behavior, in addition to protecting the business and adhering to compliance regulation. Equally important, successful SMBs conduct regular reviews of these policies and revise them as necessary […]
-
Five Reasons to Update Your Website
One of the biggest mistakes you can make when it comes to your online presence is failing to keep your website updated. There are many reasons why small business owners do not keep their website up-to-date. For most, the whole process is time-consuming and confusing. Here are 5 reasons why updating your website is critical. […]
-
Testing SES with PowerShell
SES, simple email service is one of the many services provided by Amazons AWS. It is exactly as advertised a simple email system that one can use to relay mail through. You can’t set up an email box so there is no receiving mail with SES. It is used in a lot of different situations, […]
-
The Latest iOS Update (12.2) Patches Some Serious Security Vulnerabilities
On Monday, Apple released iOS 12.2 to patch a total of 51 security vulnerabilities in its mobile operating system that affects iPhone 5s and later, iPad Air and then, and iPod touch 6th generation. Most of the vulnerabilities Apple patched this month reside in its web rendering engine WebKit, which is used by […]
-
5 Effects of Cloud On Todays Technology
Ever wondered how Cloud has changed the lives of many people? How it aided customers into finally getting what they need, the developers in creating the perfect software for their clients and lastly how Cloud has affected technology. We’ve rounded up some of the summaries of the top effects of Cloud on technology: Accessibility For […]