Let’s Play (Cyber) Wargames

We live in the highest state of Cybersecurity alerts in history. Attacks were growing quickly before the COVID pandemic, but since then, they are growing exponentially ...

Network as a Service (Naas) vs Network

In the business world, it seems that more and more things that used to be products are now services – especially in technology. They put the acronym ‘aaS’ (as a Service) after just about everything to do with computing. ...

QR Codes Can be a Quick Rip-off

If you want to see the cutting edge of technology, look at advancements that make it easier for organizations of any type, from charities to retailers, to get money from you. ...

Beware the Free Flash Drive

This particular method of cyber-attack has been around for a while, but it’s clearly not going away anytime soon. ...

The Effect of Social Engineering on Cybersecurity

Sounds like a deep, complex issue, but it’s really pretty simple. Cyber criminals do not spend their time throwing around esoteric behavioral principles in discussions ...

What Windows 365 Can Do for You

Microsoft’s Windows 365 has now been out for a year and a half. With it, we entered a new era of simplified productivity for the modern hybrid or remote workforce. ...

Two Plans you Need to Have in Place

We presume you have a Business Plan, where company goals and objectives and the methodology for achieving them are established ...

Why You MUST Use Multi-Factor Authentication

The sad fact is: Business is very, very good – for Hackers and Cyber Criminals. They are setting all-time records in Ransomware and other types of breach attacks ...

Enhanced Data Protections for Microsoft 365

Gadgets. New gadgets are everywhere, and more appear every day. They can be for home, for work, for your car – there are new gadgets for everything and more and more ...

Is Your Home ‘Smart’?

Gadgets. New gadgets are everywhere, and more appear every day. They can be for home, for work, for your car – there are new gadgets for everything and more and more ...