Blog

How to Spot an Email Phishing Scam

It only takes a couple of clicks to compromise your IT network and the human link remains the weakest one. Being able to identify a social engineering scam is important because malware can result in identity theft, a takeover of your business network and have real...

Five IT Roadmapping Secrets

As Virtual Chief Information Officer (vCIO) at Smart Dolphins IT Solutions, I simplify the IT planning process by helping professionals navigate the intricacies of IT, so that their time can be spent on what they do best. These five elements essentially make up the...