Blog

Data Privacy: Who is listening to your private conversations?

Data Privacy: Who is listening to your private conversations?

Digital assistants such as Siri and Cortana are becoming increasingly convenient to use as the platforms mature. Many were led to believe this was through the power of Artificial Intelligence, but recent announcements from Facebook and Microsoft showed that’s not entirely the case. A great deal of buzz around privacy of online voice-based systems was… Continue reading Data Privacy: Who is listening to your private conversations?

Still running that 2008 Server? The end is nigh!

Still running that 2008 Server? The end is nigh!

Last week, Microsoft officially ended support for the first of its 2008 Server product line – SQL Server 2008 & SQL Server 2008 R2. As with any ‘End of Life’ product, this means that there will be no further security updates released for these products. Although there have been limited exceptions to this rule in… Continue reading Still running that 2008 Server? The end is nigh!

Considering a Bring Your Own Device Policy? Here’s how to make it work…

Considering a Bring Your Own Device Policy? Here’s how to make it work…

The benefits for BYOD are plain to see, but how should it be managed? With digital device ownership increasing throughout Australia, studies show the benefits of introducing a Bring Your Own Device policy (BYOD) into the workplace. This would seem to make sense as the devices we use to be productive at work are essentially… Continue reading Considering a Bring Your Own Device Policy? Here’s how to make it work…

Blue skies or rain: Is cloud computing really the better option?

Blue skies or rain: Is cloud computing really the better option?

Recent news reports suggest a deluge of problems. Could the cloud be bringing us more stormy weather than sunshine?

How one phone call could take down your entire organisation

How one phone call could take down your entire organisation

Just like spear phishing attacks, phone-based scams are very much a threat to your organisation that prey on your team’s trust, and can be just as common. Scammers that utilise this attack vector operate by posing as trusted companies (Microsoft, Google, etc.), then doing their best to convince users to provide unchecked access to your environment.… Continue reading How one phone call could take down your entire organisation

Pin It on Pinterest