Blog

How one phone call could take down your entire organisation

How one phone call could take down your entire organisation

Just like spear phishing attacks, phone-based scams are very much a threat to your organisation that prey on your team’s trust, and can be just as common. Scammers that utilise this attack vector operate by posing as trusted companies (Microsoft, Google, etc.), then doing their best to convince users to provide unchecked access to your environment.… Continue reading How one phone call could take down your entire organisation

5 Essential I.T. Policies You Can’t Survive Without

5 Essential I.T. Policies You Can’t Survive Without

The impact technology is having on our lives is undeniable, and nowhere is this more evident than in the workplace. Where businesses used to be able to have a single page of their ‘Employee Handbook’ devoted to ‘Computer Usage’, there are now far more factors to consider, both internal and external, which need to be… Continue reading 5 Essential I.T. Policies You Can’t Survive Without

The most important lesson to learn from the Kathmandu data breach

The most important lesson to learn from the Kathmandu data breach

It is a news story all too familiar these days sadly, and Adventure Apparel & Equipment Retailer Kathmandu is just the latest to disclose that it has suffered a data breach this year.

5G is Coming – But what can it do for me?

5G is Coming – But what can it do for me?

5G is the latest advancement in the wireless networking space, coming as an upgrade to 4G LTE technology that has been in use for roughly 10 years now. The specification for 5G provides some massive shoes to fill over the next few years: huge data transfer speeds, extremely low latency (the time it takes for… Continue reading 5G is Coming – But what can it do for me?

Pin It on Pinterest