20 June 2015Access Technologies What does USB stands for? Unwanted Security Breach? When I started my career in this industry we used to share data between computers by means of the Nike or Adidas […]
20 June 2015Access Technologies What is Malvertising and How Could it Affect Your Business? In life, it is generally very easy to identify security threats. We are instinctively cautious of our surroundings when entering our pin […]
15 June 2015Access Technologies Not all Hacking is bad, it is often good! If the headline surprises you, we may be talking across purposes… In this post I am talking about creating rather then destroying […]
15 June 2015Access Technologies The importance of wireless connectivity in education This blog discusses why connectivity is essential to embracing technology that enhances the learning experience. Over the past decade, there has been […]
15 June 2015Access Technologies Internet access: making a choice for your future In this blog I discuss why it’s important to choose a connectivity solution that meets the needs of your business today and […]
15 June 2015Access Technologies Why having the right data connection is key to embracing new technologies In this blog I discuss why it’s important to choose the right data connection for your business in order to benefit from […]
15 June 2015Access Technologies We email, but do we actually communicate? Prior to the availability of electronic communication tools, there was a time when we used to communicate by meeting face-to-face or by […]
15 June 2015Access Technologies IP Version 6: are you ready for the future? When the internet was first created, assumptions on its future success were very conservative, to say the least. And if there is […]
15 June 2015Access Technologies How to Avoid Becoming Hacked Off With Cyber Crime Last year saw some of the most brutal security attacks on the world’s giants of the software industry. Apple’s iCloud, Microsoft and […]
15 June 2015Access Technologies How to protect your business from scam emails After working within the telecommunications and technology industry for more than 20 years now, I’ve seen my fair share of email scams. […]