IT Consulting Company
Login | Need To Switch To A New Tech Company?
Call 1300 555 920

First impressions are important. This is even more so in the world of technology. When searching for a company online, your first results appear in a small 160-character snippet. Now Google has officially extended the search results snippets to a maximum character length of 320 characters. What is a snippet? Snippets, also known as meta […]

Social is here to stay. That’s the unanimous sentiment regarding social media as a communication tool – and as a marketing channel. LinkedIn launched publicly before Facebook (2003 and 2006, respectively), and in these past 15 years we’ve seen an evolution, and some might say a revolution. Social media has redefined how society interacts, even […]

Technological advancements have, without a doubt, had a positive impact where your business is concerned. But they have also led to hacking, data breaches and the likelihood that rogue employees will use tools to jeopardize the security of your data. What is a Rogue Employee? A rogue employee undermines your business by ignoring rules and […]

The most talked about hardware issue in the news right now is the “Meltdown” (CVE-2017-5754) and “Spectre” (CVE-2017-5753 and CVE-2017-5715) exploits. Nearly all the computers around the world are affected by one or both bugs. All the big-name software and hardware vendors such as Microsoft, Apple, and Google have been hard at work crafting a […]

If you think that all telephone services are equal and that there’s no difference between a business phone and a home phone system, you’d be wrong. In fact, there are several differences between a phone used for business and a phone used for personal calls, including required call features, calling abilities, and even how many […]

The year 2018 started with a Meltdown that even Mac and iOS users aren’t immune to. Meltdown is a flaw in processors that allows a hacker to gain access to the personal data stored in your computer. Meltdown, and the similar Spectre were discovered January 3rd. They affect processors from Intel, AMD, and ARM, leaving […]

Did you know that in 2016, IBM found that 60% of all cyber attacks were carried out by insiders? Of these three quarters were due to malicious intent, and one fourth due to negligence or error. Accidents: According to Verizon’s 2016 Data Breach Incident Report, accidents accounted for 30% of security incidents. In many cases, employees haven’t […]