Stack of t50, t30, t10, t70

CyberSecurity

[vc_row][vc_column][vc_column_text]There are criminals in all walks of life trying to get something for nothing. Criminals try and trick us with with social engineering methods by building trust, using fear tactics, emphasising a sense of urgency, engaging our greed, intimidation, appealing to our willingness to help amongst other strategies. Humans are the weakest link. Social engineering is essentially "Psychological manipulation of…

What is IoT?

You may have heard some of the hype around home automatation or IoT in the news. When I look at it over the past couple of decades I see that some type of automation has be happening and improving for a while. We have had plug-ins on a timer that can turn devices like lights on at night automatically often…

IT Managed services

IT services comes in a variety of flavours but rendered down to 2 main options: Managed service model and break/fix service model. Below are definitions of both models: Managed Service model A managed services provider (MSP) is most often an information technology (IT) services provider that manages and assumes responsibility for providing a defined set of services to its clients…

Wireless Access Point (WAP) solutions

Most routers provided by ISPs (Internet Service Providers) are equipped with a built in (W)AP. This hardware scenario is often fine for home use but usually does not work well in the business environment for many reasons. One AP can typically connect to 30 active devices within 100 or so metres of open air. If you need more than 30…