BECA Blog

Our IT services blog provides you with technology news, tips, trends and updates

Cyber Security

Protect Your Business from Insider Threats

Insider Threats

When you think about protecting your business from security threats, you’re probably picturing external threats, like hackers. But insider threats...
Improve Security Posture on Mobile

Improve Security Posture on Mobile

From smartphones to laptops, mobile devices are everywhere. With the bring your own device (BYOD) market set to reach $367...
What Your BYOD Policy Should Include

5 Things Your BYOD Policy Should Include

It’s difficult to overstate the benefits of introducing a bring your own device (BYOD) policy into your business operations. In...
How To Spot a Phishy Email

Spot a Phishy Email

Just because you have security software on your computer or phone doesn’t mean you’re free from phishing emails.  That’s what...
WhatsApp Voice Scam

WhatsApp Voice Scam

In 2017, many Irish WhatsApp users saw a WhatsApp voice scam which hid a link redirecting victims to a malicious...
Tech Support Scams

Tech Support Scams

Nowadays, tech support scams are some of the most favorite among cyber criminals, and that is unfortunately because of their...
End User Security Training

End User Security Training

Hackers commonly target businesses through their end-users. This is because personnel may click on links shared through, for example, social media channels...
Improve WAN Security

WAN Security

The Internet, distributed workforces, mobile devices, and cloud service have all combined to create new opportunities for companies – and...
Protect Your Company from Cyber Criminals

Cyber Criminals

As we approach the last few months of 2020, security continues to be a hot topic. How do you protect...