cybersecurity risk

Why Newly Registered Domains May Be Your Biggest Cybersecurity Risks

Most businesses are familiar with cybersecurity risks such as phishing attacks and the potential for instigating malware from opening emails. The battle against malicious actors on the internet often seems like a never-ending problem and comes from many different directions. Recent research by the Palo Alto Network, for example, has found that Newly Registered Domains … Continued

Read More
Mobile device security

Why Mobile Device Security is Vital for Blue Collar Workers

The extent to which blue-collar and other workers use tech devices has changed over recent years. You now are just as likely to see drivers and construction workers as well as organizations such as the police suing mobile devices with their own software and business-related apps.  What it means is that mobile device security applies … Continued

Read More
IT Outsourcing

What’s New in IT Outsourcing in 2020

It can start the head spinning, keeping up with the latest IT innovations and new software appearing on the market. While it’s a continuing challenge, our relationship with business software, cybersecurity and IT systems has changed significantly over the years.  Here are just a few of the IT outsourcing trends you can expect over the … Continued

Read More

TH2tech turns 15!

We are proud to announce that we have crossed another milestone in the history of TH2 Technologies. In January, we celebrate our 15th year in business!  We want to take this occasion to thank all of our employees, clients, vendors, and friends for being an integral part of our success. What began as a small business, run out … Continued

Read More
Cloud Computing

Misconceptions about Cloud computing

A key technological growth area in the 21st century has been the development of cloud technologies. From cloud-based file storage and backup platforms to concepts such as “software as a service” (SaaS), more and more companies are using elements of cloud computing in their day-to-day business. But as with any new and developing technologies, it’s … Continued

Read More
mobile device security

How to avoid mobile device security threats

Smartphones and tablets have introduced unparalleled flexibility and versatility to modern businesses, allowing unique opportunities for remote working and connectivity. However, they are not without their risks, and any workplace that utilizes such devices must be sure to include adequate security measures as an element of its overall mobile device management strategy. According to research … Continued

Read More
Computer services / Computer repairs

DIY computer services tips and tricks

If you run a small company – or even if you’re a self-employed one-man business – then deciding how to pay for computer services isn’t always easy. Do you hire someone in-house to deal with computer problems? Outsource your computer and IT maintenance to an external contractor or agency? Or even take the risk of … Continued

Read More