My Info Tech Partner

Blog

Watch Out For Scam myGov Tax Refund Emails

Thanks to Stay Smart Online, we received notification of a new tax refund scam email that has been seen in the "wild". Its tax time and these and other similar emails will likely be doing the rounds on a regular ...

To Cloud Or Not To Cloud?

If you are like many of our clients, you’ve probably heard some of the buzz about “The Cloud” — the IT version, that is — not one of those puffy white objects up in the sky. So, what exactly is ...

Why Your Current Antivirus, Backup, And Firewall Have Been Rendered Completely USELESS (And What You Need To Do About It)

At the end of World War I, German engineer Arthur Scherbius constructed a device that would become central in another worldwide conflict of unimaginable magnitude over 20 years later: the Enigma machine. The machines, which steadily became more complex with ...

How To Keep Hackers Out Of Your Network?

You can’t deny that today we are living in an era of unprecedented technological progress. Particularly in the business world, we find ourselves more empowered day by day with the onslaught of fresh applications and features promising to extend our ...

Do You Really Want The Cheapest Computer Technician Working On Your Company’s Network?

These days, small practices are more dependent on IT systems than at any other time in history. Because of this, even the slightest technological hiccups in our cyberspace-centred workflow can have expensive, lasting consequences. Perhaps the most dramatic illustration of ...

Why Hiring The Cheapest Computer Support Company Will Actually Cost You More

As anybody working in IT will tell you, the most common question we get isn’t, “Why is my computer running so slowly?” or “Why is my Internet not working?” It’s, “What do you charge ...

5 Often Overlooked Security Measures All Firms Must Have In Place When Using Mobile Devices

Implement a mobile device policy. This is particularly important if your employees are using their own personal devices to access firm e-mail and data. If that employee leaves, are you allowed to erase firm data from their phone? If their ...

Shadow IT: How Your Firms Data Is Silently Being Leaked Online

Here’s a growing trend creeping into organisations of all industries and sizes: Shadow IT. Shadow IT are unauthorised cloud applications employees are using and downloading to perform work-related activities with company data. This can be file-sharing services like Dropbox or ...

What do you mean I’m not completely protected? I have antivirus and antimalware software.

The right software and firewalls protect us reasonably well but there is still a bit of work you have to do to keep your computer safe. Computer viruses are not unlike the common cold. Imagine yourself in a garden with ...

Simple Tricks and Tips To Spot An E-mail Scam

With the increase in hacking attacks these days one the favourite methods of hackers is to use whats known as a "phishing" email. They are designed to look like they have come from someone you know or a company you ...