-
All
- Article
- Cybersecurity
- Managed services
- Cloud
- Cyber Security
- Collaboration
- IT Risk
- Digital transformation
- Backup
- copilot
- microsoft
- video
- modern workplace
- Future of work
- Remote Workers
- network performance
- Breach
- Breech
- Cyber
- Microsoft Teams
- Culture
- 0365
- Business strategy
- CASB
- COVID-19
- Charity
- Feed the Need
- Friction-less
- AI
- Assets
- Awareness and education
- Azure
- BYOD
- Best Practice
- Business Goals
- CIO
- CISO
- Christmas
- Co-pilot
- Cyber Smart Week
- E-Waste
- EPP
- Governance
- IT budget
- KPI
- Metrics
- Restore
- artificial intelligence
- case study
- health IT consultant
- health it
Imagination at work – e-waste into school lunches While it may not seem that e-waste and hungry...
Imagination at work – e-waste into school lunches While it may not seem that e-waste and hungry...
Sep 04,2019
4 min read
Zero Trust As far as security models are concerned, one that sticks out as a good safeguard from...
Zero Trust As far as security models are concerned, one that sticks out as a good safeguard from...
Sep 04,2019
2 min read
This week, I had an interesting discussion with a local healthcare provider regarding the best way...
This week, I had an interesting discussion with a local healthcare provider regarding the best way...
Sep 04,2019
2 min read
Logging and the SIEM There are many fascinating aspects to information security, but let’s face it,...
Logging and the SIEM There are many fascinating aspects to information security, but let’s face it,...
Sep 04,2019
2 min read
How Ocean’s 8 can increase security awareness In Ocean’s 8, there’s a scene where Paul, Visual...
How Ocean’s 8 can increase security awareness In Ocean’s 8, there’s a scene where Paul, Visual...
Sep 04,2019
2 min read
Complexity is the enemy of security Organisations that manage complexity out of their environments...
Complexity is the enemy of security Organisations that manage complexity out of their environments...
Sep 04,2019
1 min read
Are hackers like bank robbers, or pickpockets? The benefits of undertaking a Pen Test (penetration...
Are hackers like bank robbers, or pickpockets? The benefits of undertaking a Pen Test (penetration...
Sep 04,2019
1 min read
Is your front door wide open? Vulnerabilities exist in all types of software.
Is your front door wide open? Vulnerabilities exist in all types of software.
Sep 04,2019
2 min read
The Importance of Quality Assurance As a journalistic organisation, it’s safe to assume that the NZ...
The Importance of Quality Assurance As a journalistic organisation, it’s safe to assume that the NZ...
May 01,2019
2 min read