Microsoft Exchange Server Bug
Microsoft has released security updates for flaws in Exchange Server 2013, 2016, and 2019 and has warned admins to immediately patch a high severity Exchange Server vulnerabilities
How Good is your IT Support? (Part 2)
In the previous article we took a look at what a good IT support provider should do in order to create a good working relationship with you, and provide quality of service. We also
How Good is your IT Support? (Part 1)
Technology has revolutionized the way we work by untold amounts over the last two decades. It is continuously evolving, and there are new tools and features being released on a reg
The Dark Web – Be prepared
In the previous article we explored how the growing technological landscape of the planet is opening doors for cyber criminals that were previously closed. We also realised that th
The Dark Web
Cyber security is – or at least should be – at the very top of your concerns in the workplace, arguably even more so than its physical security. The technological landscape of
Ensuring best cyber security practices for your SMB – The Cyber security fundamentals
In the previous article we explored cyber security and the importance of it being at the very forefront of your business concerns, and we also had a look at some of the methods use
Ensuring best cyber security practices for your SMB – The methods of attack
The cyber security of your organization – in the technologically dominated world that we operate in – should be at the very top of your business concerns. Most people have acce
Be prepared, be secure – Consequences of a data breach?
In the previous article we explored how, just because your business isn’t a large corporation, it doesn’t mean that you are immune to cyber attacks – in fact, you are more li
Be prepared, be secure – Security Best Practices for 365
Small business owners worldwide have had a particularly hard time over the last year or so, with the Government changing their minds constantly regarding the way they can trade alo
Know your cyber threats – How you can improve your security
In the previous blog in the series we explored cyber threats that utilize the user as their vessel to your data. In this, the last blog of the series, we will explore what you, the