The 6 Most Important Areas to Focus Your 2021 Cybersecurity Budget

The 6 Most Important Areas to Focus Your 2021 Cybersecurity Budget

According to a report by Channel News Asia, during the first part of 2020 COVID-19 related cyberattacks increased over 100x. Phishing, ransomware, data breaches, and other cyber threats became worse last year, spurred on by the disruption of the pandemic.  In 2021,...
Are You Using These Important Microsoft 365 Security Settings

Are You Using These Important Microsoft 365 Security Settings

A survey of companies across 26 countries, including Singapore, found that 70% of businesses have suffered a public cloud breach within the last 12 months. Cloud security has become a major issue following the migration of a majority of organizations to cloud...
What’s the Best Replacement Cycle for Business Computers?

What’s the Best Replacement Cycle for Business Computers?

Do you know how much it’s costing you to keep business computers in operation longer than you should? It’s not always apparent from the outside of a computer when it should be replaced, and performance issues tend to sneak up little by little over time.  Small...
How to Transition from a Physical to a Completely Virtual Business

How to Transition from a Physical to a Completely Virtual Business

In the wake of the COVID-19 pandemic, businesses in Singapore went through a lot of disruption, along with the rest of the world. They had to quickly transition to a remote working environment during Circuit Breaker, leaving offices empty.  While this has typically...
6 Practical Ways to Use SharePoint to Increase Efficiency

6 Practical Ways to Use SharePoint to Increase Efficiency

Because SharePoint in Microsoft 365 can do so many things, it’s often misunderstood. Some companies don’t fully utilize the app because they’re just not sure exactly how to use it. But if you take advantage of this versatile cloud solution, you can boost efficiency,...
4 Important Tactics to Defend Against Credential Hacking

4 Important Tactics to Defend Against Credential Hacking

Hacking of login credentials has gone from a few guessed or stolen passwords here and there to a major criminal enterprise. Password stealing malware is used to compromise large databases of login credentials and credential stuffing software is then employed to...
What’s the Best Way to Keep Our Cloud Apps Secure?

What’s the Best Way to Keep Our Cloud Apps Secure?

How secure is the data in your cloud applications? Probably not as secure as you might think. Many small businesses in Singapore and the rest of the world have made the transition to the cloud, and cyberattacks have followed the data there. As many as 59% of surveyed...
Are You Making the Most of Microsoft Teams? (Security, VoIP, etc.)

Are You Making the Most of Microsoft Teams? (Security, VoIP, etc.)

During the Circuit Breaker measures here in Singapore and stay-at-home orders throughout the world, cloud software that keeps remote employees connected has moved to the top of the IT necessity list. Without cloud services, this pandemic would’ve looked much...