No, this is not a political post. In fact, we know that there are some topics that don’t even merit an effort to t...
The United States government has been known to take a stand of ‘we don’t negotiate with terrorists’ when it comes to dis...
And so, the season starts. Which one is it that we’re referring to? Cyber Monday, Black Friday, Prime Day…al...
We are past the point of whether or not working remotely, or from home, is something we are unsure of. It is likely our ...
We knew that any type of newsworthy topic was going to give cybercriminals so much opportunity – and COVID-19 gave them ...
The US Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA) division announce...
Business Email Compromise (BEC) is not a new term. BEC scams have been growing in popularity for some time now. If you’r...
Imagine if you had two emails that were worth a million dollars each. You would do everything that you can to protect th...
It should hardly come as a surprise to anyone that cybercriminal activity has surged in 2020. By May of this year, the n...
Shadow IT Shadow IT refers to IT technologies, solutions, services, projects and infrastructure utilized and managed wit...
You’ve almost certainly heard of Zoom over the past few weeks – Zoom, more properly Zoom Video Communications, Inc....
Your security and IT teams know all about the dangers of cybercrime, phishing, Business Email Compromise and malware, an...
Coronavirus has brought remote working to the top of everyone’s mind. With many organizations already enabling or explor...
Why Outsource Your IT? If your company would like to consider outsourcing your maintenance and monitoring of your in-hou...
So you’ve recovered from the shock of a disaster due to server failure or a recent flood that damaged all your computers...
It’s not the first time we’ve discussed this topic and it almost certainly won’t be the last, but this week’s ...
Every sysadmin has their own favorite kind of box, and while most enterprises these days tend to have a mix of OSs in th...
Disaster Recovery Plan for your business is essential to protect against as it is the essential process of recovering da...
The security for today’s information systems go much beyond the general protection measures that were usually considered...
3CX is a very customisable platform allowing it to be used in many different ways; So we have been working hard to put t...