-
All
- Article
- Cybersecurity
- Managed services
- Cyber Security
- Cloud
- Collaboration
- Backup
- IT Risk
- video
- Digital transformation
- modern workplace
- Remote Workers
- network performance
- Breech
- Microsoft Teams
- copilot
- microsoft
- Culture
- 0365
- Business strategy
- CASB
- COVID-19
- Charity
- Feed the Need
- Friction-less
- Future of work
- AI
- Assets
- Awareness and education
- Azure
- BYOD
- Best Practice
- Breach
- Business Goals
- CIO
- CISO
- Christmas
- Co-pilot
- Cyber
- Cyber Smart Week
- E-Waste
- EPP
- Governance
- IT budget
- KPI
- Metrics
- Restore
- artificial intelligence
- case study
- health IT consultant
- health it
While it may not seem that e-waste and hungry children have anything in common, Auckland IT...
While it may not seem that e-waste and hungry children have anything in common, Auckland IT...
Sep 04,2019
4 min read
As far as security models are concerned, one that sticks out as a good safeguard from the threat of...
As far as security models are concerned, one that sticks out as a good safeguard from the threat of...
Sep 04,2019
2 min read
This week, I had an interesting discussion with a local healthcare provider regarding the best way...
This week, I had an interesting discussion with a local healthcare provider regarding the best way...
Sep 04,2019
2 min read
There are many fascinating aspects to information security, but let’s face it, logging is probably...
There are many fascinating aspects to information security, but let’s face it, logging is probably...
Sep 04,2019
2 min read
In Ocean’s 8, there’s a scene where Paul, Visual Matrix Designer for the Metropolitan Museum is...
In Ocean’s 8, there’s a scene where Paul, Visual Matrix Designer for the Metropolitan Museum is...
Sep 04,2019
2 min read
Organisations that manage complexity out of their environments gain more value from their IT spends...
Organisations that manage complexity out of their environments gain more value from their IT spends...
Sep 04,2019
1 min read
The benefits of undertaking a Pen Test (penetration test) are widely known, yet few businesses...
The benefits of undertaking a Pen Test (penetration test) are widely known, yet few businesses...
Sep 04,2019
1 min read
Vulnerabilities exist in all types of software.
Vulnerabilities exist in all types of software.
Sep 04,2019
2 min read
As a journalistic organisation, it’s safe to assume that the NZ Herald places utmost importance on...
As a journalistic organisation, it’s safe to assume that the NZ Herald places utmost importance on...
May 01,2019
2 min read