News

4 things to consider before starting a WFH initiative In our last blog, we talked about 5 things to plan and analyze before you initiate a WFH policy. In this blog, we address four interrelated issues that need careful consideration.Equipment - It should be outlined...

Implementing work from Home: Planning Matters Work From Home, also commonly known as telecommuting, is a fairly general term that encompasses a range of workplace policies. Most generally, it refers to a policy permitting an employee to work from home (or any other approved remote location-the...

Why we still worry about Work from Home policies If you have been in the workplace for a few decades, you may remember that the idea of telecommuting began to appear in the late 90’s as Internet access from home began to become more common. Telecommuting...

7 ways a Work From Home policy can help your business In the last several years, the concept of WFH has become increasingly more popular. Though some still remain skeptical, it has been gaining in popularity and become more widely accepted among management circles. That said,...

Free Internet Access? Don’t fall for this one One of the popular internet scams that has been doing the rounds since 2017 is the one about “Free Internet”. This scam seems to resurface and somehow manages to claim quite a few unsuspecting victims. Here’s how they...

Online shopping? Watch out for these red flags Who doesn’t like online shopping? Online shopping has opened up a whole new world to us. Get whatever you want, whenever you want, without wandering from store to store. It doesn’t matter if it is too hot to...

DNS Cache poisoning: What every SMB must knowIn one of the most common poisoning attacks, the attacker poisons the DNS Cache with the aim of leading visitors to a fake website. In a DNS cache poisoning case, the attacker gains control of the DNS server...

Protecting yourself against poison attacks Data poisoning by way of logic corruption, data manipulation and data injection happen when the attacker finds a way to access your data set. The kind of poison attack varies depending on the level of access the attacker is able to...