Security Penetration Testing Explained …pen testing myths Penetration testing is a complex subject surrounded by many myths and misconceptions. Here are the most common myths debunked. ‘Only large organisations can afford pen testing’ Pen… Continue reading
Blogs and insights Your Guide to Microsoft Teams …section, you can decide how you want Teams to behave on your computer. For example, do you want Teams to start up automatically when you boot up your computer? Or… Continue reading
Blogs and insights Microsoft updates Microsoft’s AI Announcements in 2023 So Far …Learn more Azure OpenAI Service Azure OpenAI Service brings the power of OpenAI’s GPT and DALL-E models to organisations everywhere backed by Microsoft’s infrastructure. With Azure OpenAI, customers… Continue reading
Blogs and insights 2024 Data Loss Prevention (DLP) Best Practices for Your Business …response plan is essential for minimising the impact of a data breach. Regularly review, update, and test your plan to ensure it addresses the latest threats and incorporates best practices… Continue reading
Blogs and insights Security How to Avoid Ransomware: 4 Simple Ways to Stay Safe … But how exactly does this happen? It commonly happens when victims mistakenly download malware by opening malicious email attachments and or downloading files from unverified sources. The hacker… Continue reading
Blogs and insights Security How To Identify And Block CVE-2021-41379 Using Only Endpoint …Application Event Log with a package name of ‘test pkg.msi’. Using a YML file to add detection to your environment of preference: https://github.com/SigmaHQ/sigma/blob/497a9d9e2adde6b46b8870406ced239a6752f729/rules/windows/file_event/file_event_cve_2021_41379_msi_lpe.yml https://github.com/SigmaHQ/sigma/blob/497a9d9e2adde6b46b8870406ced239a6752f729/rules/windows/process_creation/win_exploit_lpe_cve_2021_41379.yml https://github.com/SigmaHQ/sigma/blob/db03d08b1105f33de763187da7681725ba70accd/rules/windows/builtin/win_vul_cve_2021_41379.yml Mitigating the attack using AppLocker… Continue reading
Security What is Social Engineering and What are the Red Flags? …commit cybercrime. How social engineering works Social engineering explained: Preparation: The social engineer researches their victim and pulls together information about them using social media and the internet etc… Build… Continue reading
Microsoft updates Microsoft Ignite 2022: What’s Been Revealed This week Microsoft Ignite took place. The annual event reveals the latest features, updates, and technology coming to Business Apps, Cloud Services, Security and more. The focus for this year’s… Continue reading
Communications What Exactly Is Unified Communications (UC)? …positive and seamless communication experiences for both employees and clients while enabling staff to work remotely? The remedy for this issue? Unified Communications (UC). Defining Unified Communications Unified Communications describes… Continue reading
Blogs and insights Security The Latest Cyber Attack Headlines: A Deepfake CFO and the Mother Of All Breaches …and responses of corporations in the event of a cyber attack. The Latest Cyber Attack on Lush – and the Company’s Silence In early January, popular cosmetics company Lush confirmed… Continue reading
Blogs and insights Communications The PSTN 2025 Switch Off – What Does This Mean For Your Business? …materials. Utilise these resources and get your teams ahead of the competition. Transition your comms to the cloud Making the change sooner rather than later will give your business plenty… Continue reading
Blogs and insights Security 5 Common Cyber Security Risks and How to Mitigate Them …and reputational damage. It’s crucial for organisations to be proactive in identifying and addressing these risks to protect their data and systems. Common IT Security Risks Let’s discuss some common… Continue reading
Blogs and insights Security Public Sector Cyber Security: A Guide to Cyber Resilience …so it is crucial to continually improve and adapt your cyber security measures. Stay updated with the latest security technologies, trends, and best practices. Regularly assess and test your security… Continue reading
Blogs and insights Every Business is an Internet Business – Why Broadband Matters …yellow pages. Then, they would call them using a landline phone. But today, all of that has completely changed. External business communications Today, the internet has simplified external interactions for… Continue reading
Communications Unified Communications and Collaboration (UCC) – Why They’re Better Together …are only successful when they can quickly and easily connect and communicate. Therefore, communication and collaboration go hand in hand, and the convergence of unified communications and collaboration is a… Continue reading