Latest posts

Coming to our sensors

One of the fastest-growing and seemingly unstoppable trends of this year seems to be that of device sensors that collect information of all kinds and use it to automate our lives.

Continue reading

Third Party Patch Roundup – April 2016

Keeping your organization’s network safe is an ongoing challenge, and of course applying security updates in a timely manner is a big part of that. Here are April’s 3rd party patch updates featuring Adobe, Google, Mozilla and Linux.

Continue reading

10 ways to prevent ransomware from damaging your business

Ransomware, commonly spread through e-mail or web sites, is a piece of malicious code that encrypts as much data as it can using a very strong encryption key. Here’s how to prevent it.

Continue reading

Installing Exchange 2016 into an existing Exchange 2010 org – The Exchange Deployment Assistant

In this post we take a look at a free tool from Microsoft that we are going to use to guide our overall deployment of Exchange 2016 – the Exchange Deployment Assistant.

Continue reading

Oh snap! QuickTime is no longer safe

After many years of loyal service, Apple’s QuickTime has been classed as unsafe due to its many security holes. For this reason, security experts are recommending to uninstall QuickTime from Windows computers.

Continue reading

Introducing GFI LanGuard 12 – now with a web-based reporting console

Today GFI Software is releasing a new version of GFI LanGuard which is powered by a new web console which takes the product to a whole new level by providing centralized reporting across multiple GFI LanGuard instances.

Continue reading

Is technological tyranny the latest trend in business?

The benefits of BYOD to users – convenience and control – are obvious. The benefit to the business’s budget is reduced capital expenditure but the disadvantages are now rearing their ugly heads.

Continue reading

Hack Hall of Shame – March 2016

March was certainly the month of ransomware with more medical institutions held at ransom by these kind of cyberattacks.

Continue reading