Cyber Security The importance of community vigilance in cyber security

In the constantly evolving landscape of cyber security, vigilance and expertise are key. This was recently highlighted when a critical concern was... Read more

Cyber Security Clearing up the complex world of penetration testing

Cyber security is hard. There are a million[1] vendors, who each have a million[1] products, there are a million[1] standards that every business... Read more

Automation Why Companies Hesitate to Use Automation (And Why They Shouldn't)

A decade ago, when I witnessed the marvels of automation software, I was certain that this was the future of business – I mean, which business... Read more

Cyber Security What is Cyber Threat Intelligence, and why do I need it?

Threat Intelligence is a rather timely topic, as more employees are working remotely, accessing online systems, and communicating over online... Read more

IT & Cloud Geo-blocking in Microsoft 365 – Is it enough?

No one wants to be at the receiving end of a cyber security breach. As businesses and organisations migrate their operations and data to the cloud,... Read more

Cyber Security A practical approach to modern Data Security

This article was originally published on TechDay Read more

IT & Cloud The secret behind The Missing Link’s stellar CSAT scores

Customer satisfaction is the true metric of success for any business. A happy customer is the best ambassador for any company, spreading the good... Read more

IT & Cloud Addressing Microsoft 365's top five security misconfigurations

Security in our digital world is paramount, and for businesses using Microsoft 365 (M365), understanding potential pitfalls in security settings is... Read more

Cyber Security Red Teaming vs. Penetration Testing: What's the difference?

Organisations that store sensitive data are facing more and more security threats. It's crucial to protect that data and defend against cyber... Read more

IT & Cloud Five reasons to upgrade to Microsoft Teams Premium

Finding a platform that can meet increasing demand for meetings, reduce costs by consolidating solutions and prioritise security for sensitive... Read more