Protect your business from WannaCry and future ransomware threats We’re providing a quick action list to reduce the spread and impact of WannaCry, the ransomware which affected 200,000+ systems in…
Is your data an easy target for social engineering hacks? For a process called ‘penetration testing’ a credit bureau recently hired a security company (run by a well-known former cybercriminal…
Making the most out of customer satisfaction surveys. Internal QA scores and customer satisfaction surveys don’t always reach the same conclusions. For example, an end-user customer at a hospital has…
3 easy ways to get more from your tech support Hi-tech product & service companies recognize that providing technical support is not just to address user issues in areas such as installation, connectivity,…
(How not to get caught in) The Catch 22 of tech support economics. ‘After-market tech support’ was one of the big subjects of discussion at the recent Consumer Electronics Show…
5 steps to build your cyber security strategy With every passing day, businesses become more reliant on online resources. It’s very likely your business has either moved to or at least discussed shifting workloads to…