The Webcom Blog
Welcome to the Webcom Blog | Weekly musings from a Managed Service Provider
5 Common Cyber Threats in 2025 (and How To Avoid Them)
In 2025, cyber threats are in almost every nook and corner. They might be with the intent to destroy computers, steal data, or take money. Understanding what they are and how protection against them works will come in handy. What Are the Most Common Cyber Threats? They come in so…
Can Password Managers Be Hacked?
Password managers keep our online accounts safe. They store all our passwords in one place. But are they hackable? What Are Password Managers? Password managers are like digital vaults: they save all your passwords inside themselves. You need only remember one master password, of course. This makes keeping a lot…
Home Security: Why You Should Put IoT Devices on a Guest Wi-Fi Network
The number of internet-connected devices in homes has been growing. It's increased exponentially over the last decade. A typical home now has 10.37 devices connected to the internet. PCs and mobile devices make up a little over half of those and the rest are IoT...
How Often Do You Need to Train Employees on Cybersecurity Awareness?
You’ve completed your annual phishing training. This includes teaching employees how to spot phishing emails. You’re feeling good about it. That is until about 5-6 months later. Your company suffers a costly ransomware infection due to a click on a phishing link. You...
5 Reasons Why Strong Patch Management is Important
Two-Factor Authentication is a second way to verify yourself apart from a password.
Two-Factor Authentication
Two-Factor Authentication is a second way to verify yourself apart from a password.
How to spot a phishing email
Phishing is a common type of cybercrime because it is cheap and effective. They will often send out thousands of emails in the hope that only 0.001 percent of recipients will bite. It only takes one or two responses for the phishing campaign to be successful.
How to Increase Image Quality and Optimise before Uploading to your Website
When you create a website (eCommerce or blog), having a strong visual communication game is everything. Before you press that ‘Publish’ button, make sure the images you choose are doing justice in complimenting the text on your website.
SaaS Backup – a shared responsibility
This year, over 78% of businesses will rely completely on SaaS (Software as a Service) applications. However, there is a common misconception that the SaaS provider is responsible for backing up this data.
Business Continuity and Disaster Recovery
For the first time since I became a Datto partner, I had to use their BCDR (Business Continuity and Disaster Recovery) applications in a live environment for one of my biggest clients.
Protect Remote Workers | SaaS Protection
Small and medium-sized businesses around the globe are facing many challenges as they manage an abrupt shift to remote work. This has caused a surge in the use of cloud collaboration apps.
What are Managed Services?
