The Webcom Blog
Welcome to the Webcom Blog | Weekly musings from a Managed Service Provider
Top 10 Security Tips for Mobile App Users
Mobile applications have become an integral part of our lives. We use them to browse the internet, network, communicate, and much more. But they open us up to risks caused by fraudsters who may steal information or damage our phones. According to 2024 data from Asee, over 75% of published…
Is It Time for a Device Upgrade? Check for These 7 Signs
Technology is fast, and in no time, our gadgets get outdated. According to data from Statista, consumers replace their devices about every 2-3 years. Still, it can be tricky to determine when an upgrade is needed. Upgrading your device isn’t just about having the latest gadget. An up-to-date device is…
Did You Just Receive a Text from Yourself? Learn What Smishing Scams to Expect
How many text messages from companies do you receive today as compared to about two years ago? If you’re like many people, it’s quite a few more. This is because retailers have begun bypassing bloated email inboxes. They are urging consumers to sign up for SMS alerts...
6 Discontinued Technology Tools You Should Not Be Using Any Longer
One constant about technology is that it changes rapidly. Tools that were once staples, like Internet Explorer and Adobe Flash, age out. New tools replace those that are obsolete. Discontinued technology can leave computers and networks vulnerable to attacks. While...
Home Security: Why You Should Put IoT Devices on a Guest Wi-Fi Network
The number of internet-connected devices in homes has been growing. It's increased exponentially over the last decade. A typical home now has 10.37 devices connected to the internet. PCs and mobile devices make up a little over half of those and the rest are IoT...
How Often Do You Need to Train Employees on Cybersecurity Awareness?
You’ve completed your annual phishing training. This includes teaching employees how to spot phishing emails. You’re feeling good about it. That is until about 5-6 months later. Your company suffers a costly ransomware infection due to a click on a phishing link. You...
5 Reasons Why Strong Patch Management is Important
Two-Factor Authentication is a second way to verify yourself apart from a password.
Two-Factor Authentication
Two-Factor Authentication is a second way to verify yourself apart from a password.
How to spot a phishing email
Phishing is a common type of cybercrime because it is cheap and effective. They will often send out thousands of emails in the hope that only 0.001 percent of recipients will bite. It only takes one or two responses for the phishing campaign to be successful.
How to Increase Image Quality and Optimise before Uploading to your Website
When you create a website (eCommerce or blog), having a strong visual communication game is everything. Before you press that ‘Publish’ button, make sure the images you choose are doing justice in complimenting the text on your website.
SaaS Backup – a shared responsibility
This year, over 78% of businesses will rely completely on SaaS (Software as a Service) applications. However, there is a common misconception that the SaaS provider is responsible for backing up this data.
What are Managed Services?
