News

Stay up to date with industry news. Let us know if there is something specific that you would like to know about. And of course, feel free to share.
Featured image for “The Latest Office 365 Editions: What Business Owners Need to Know”
29/11/19

The Latest Office 365 Editions: What Business Owners Need to Know

Just a month after Microsoft launched its new subscription-based Office 365 Home Premium for individual users, the company rolled out a major update to Office 365 for enterprise users, too. As with any major tech release, Microsoft has had its fair share of supporters and detractors. Most of the negative articles were focused on their licensing changes. Whether you find...
Read More
Featured image for “Demonstrating Compliance with Data Security Regulations Can Be Easy if You’re Prepared”
14/11/19

Demonstrating Compliance with Data Security Regulations Can Be Easy if You’re Prepared

In our final blog in this series on how passwords help you protect your most important business data, We look at how rock-solid password management can also protect you from legal trouble. These days, most businesses are subject to data protection laws or regulations of one kind or another. Some come with pretty stiff penalties. To help demonstrate you’re compliantwith...
Read More
Featured image for “Do You Know Who Has Access to Your Systems?”
11/11/19

Do You Know Who Has Access to Your Systems?

This blog gets at a really important topic for businesses, especially smaller businesses that don’t have a lot of extra resources for dealing with IT admin. Using a centralized access control system to make sure your systems aren’t accessible by people who have left your company is really important to overall security. The last time an employee left your business,...
Read More
Featured image for “Stay Ahead of Hackers by Changing Your Passwords”
07/11/19

Stay Ahead of Hackers by Changing Your Passwords

We’re continuing to explore the topic of passwords and how they help keep your business data and systems secure in this next blog on when and how you should update your passwords. An alert pops up on your computer: It’s time to change your password again. Sigh. Fine. You’ll just change from password4! to password5! and— Not so fast. Regular...
Read More
Featured image for “Strong Security Starts with Strong Passwords”
05/11/19

Strong Security Starts with Strong Passwords

We have been thinking a lot about client security lately. When we came across this blog series about passwords, we knew we had to share it with all our clients. It’s all too easy to think passwords are a nuisance—when really they’re essential to keeping your data and your business safe. If you use the same password for multiple systems—online...
Read More
Featured image for “Data Backup Essentials – What Every Company Must Know”
01/11/19

Data Backup Essentials – What Every Company Must Know

Any loopholes in managing company data can have serious consequences. Take, for example, Morgan Stanley which had to pay up financier Ronald Perelman a whopping $1.45 billion, in part because the global giant could not produce all the critical email communication during the trial’s disclosure phase. Whether yours is a small, medium-sized, or large business, you must put the necessary...
Read More
Featured image for “Unsecured Adobe Server Exposes Data for 7.5 Million Creative Cloud Users”
29/10/19

Unsecured Adobe Server Exposes Data for 7.5 Million Creative Cloud Users

The U.S. multinational computer software company Adobe has suffered a serious security breach earlier this month that exposed user records’ database belonging to the company’s popular Creative Cloud service. With an estimated 15 million subscribers, Adobe Creative Cloud or Adobe CC is a subscription service that gives users access to the company’s full suite of popular creative software for desktop...
Read More
Featured image for “Multiple Security Flaws Found In Cisco Aironet Access Point Software”
23/10/19

Multiple Security Flaws Found In Cisco Aironet Access Point Software

Cisco has disclosed 13 big security vulnerabilities in its most recent software security advisory for Cisco IOS and Cisco IOS XE. The company said that all administrators should review their devices to determine which version of this software they are using. Running an outdated version could mean their devices are exposed to some of these vulnerabilities, said Cisco. According to Cisco, these...
Read More
Featured image for “‘Tarmac’ Virus Enters your MacOS as ‘Pop-ups’”
23/10/19

‘Tarmac’ Virus Enters your MacOS as ‘Pop-ups’

A new form of malware, dubbed ‘Tarmac’ is making its appearance on Mac devices. What is Tarmac malware? How does it work? Tarmac is a ‘malvertisements’ or malicious ads discovered by security researchers. Tarmac malware is also known as OSX. Tarmac is actually a companion of Shlayer, an older program. The two viruses work together to infect MacOS users with spam advertisements....
Read More
Featured image for “New 0-Day Flaw Affecting Most Android Phones Being Exploited in the Wild”
21/10/19

New 0-Day Flaw Affecting Most Android Phones Being Exploited in the Wild

Another day, another revelation of a critical unpatched zero-day vulnerability, this time in the world’s most widely used mobile operating system, Android. What’s more? The Android zero-day vulnerability has also been found to be exploited in the wild by the Israeli surveillance vendor NSO Group—infamous for selling zero-day exploits to governments—or one of its customers, to gain control of their...
Read More
Featured image for “What are the Differences Between Azure Active Directory and Azure Active Directory Domain Services?”
19/10/19

What are the Differences Between Azure Active Directory and Azure Active Directory Domain Services?

Some of the most commonly asked questionsI asked are around tradational on premise Active Directory and Azure AD services and the differences between all the flavours available to them when adopting a hybrid posture. More specifically, what are the difference between: Azure Active Directory (AAD) Azure Active Directory Domain Services (AADDS) Active Directory (AD) It’s essential to understand the differences when you’re looking...
Read More
Featured image for “Sample Internet & Email Usage Policy”
17/10/19

Sample Internet & Email Usage Policy

As IT consultants we are often asked to assist our clients with Acceptable use Policies.  IT is very unlikely that any two usage policies will be identical, as companies have different requirements, however it helps to have a sample policy to start as a base and then adapt as required.  I have provided very simple yet effective Internet and Email...
Read More

Join our mailing list

Please phone or email us, or if you would prefer to just receive news and updates, please submit your email address below.