The Trojan Horse story is well-known, with the old saying – beware of Greeks bearing gifts. Trojan computer viruses take their name from the hollow... Read more
This blog is the final part of our 3-part series on DMARC email security. Read Part 1: What is SPF, DKIM and DMARC? Read Part 2: A closer look at how... Read more
This blog is Part 2 in our 3-part series on DMARC email security. In Part 1, we explored the foundations of DMARC and how it builds on SPF and DKIM... Read more
This blog is Part 1 in our 3-part series on DMARC email security. Read more
The advantages of a paperless office are obvious: from saving time for the retrieval of physical documents to improving workforce collaboration,... Read more
It's time to put your entrepreneur hat on and imagine that you're embarking on a new adventure and starting your own dream company. It's a dream come... Read more
On Wednesday 14th of April, Matthew Johnson, one of our senior security consultants released details of a new wireless-based attack dubbed... Read more
We've levelled up, and we are opening an office in the UK! Read more
To be “slow and low” is an Advanced Persistent Threat (APT) signature. Unnoticed, they penetrate security walls and find their way into networks and... Read more
The pandemic has changed the way we work. Last year, 91% of employees asked for modern technology solutions to amp their productivity, especially... Read more
The move to cloud-based services has been a game-changer for the businesses that have implemented full or hybrid solutions, but with this style of... Read more