T4
Blog and Articles

Phishing scams – what are they?

Phishing scams are attempts by scammers to trick users into giving them personal information such as passwords, bank details, card numbers. In some cases they encourage the user to make payments to false accounts.   What should you look out for?   The email address – is it the right one for that person? The.
Read More…

Disaster Recovery

What is a Disaster Recovery Plan?   A DR plan is a set of policies and procedures that are put in place to protect a business IT infrastructure. It is put in place to enable the recovery or continuation of vital technology infrastructures and systems in the event of a disaster.   Why do you.
Read More…

Technology is driving business innovation

Business Innovation It has long been seen that the direction a business wants to go in would determine how technology grows and progresses. Historically, small businesses have driven innovation and the creation of new technology. If a company needed an application to work in a specific way, technology would create a system to benefit all.
Read More…

Http vs Https

From July 2018, Google Chrome will begin to mark all http:// sites as not secure due to the security risk such unencrypted sites can pose – What is the difference between encrypted and unencrypted sites? Http (Hyper Text Transfer Protocol) is the method by which data is moved around the web. If you look at.
Read More…

What does your email signature say about you?

There are hundreds of email signature templates available to businesses. A professional email signature should leave a lasting impression, but this should be for the right reasons! Signatures can include dynamic marketing content such as social media icons, promotional banners, award logos and more. You can even opt to have different signature designs for different.
Read More…

New Year, New Password.

When was the last time you changed your password? For many people, once a password is set, they don’t like to change it, but how easily could your security access be guessed? And when a hacker has worked our your access details, how many systems can they access using that same security logon? It might.
Read More…