Entries by

It’s Time Your Business Adopted UEM, And This Is Why!

The way in which we manage our workforces’ devices is changing. Gone are the days of large, overly complicated on-premise management solutions like Quest (Dell) KACE and Microsoft System Centre. With the continued drive of remote working, flexibility and ultimately employee separation our management tools need to change, now. Luckily, Microsoft where ready for this […]

Virtual Roundtable Recap: Facing and Overcoming IT Challenges In Education

This week, our panel of special guests came together for an educational virtual round table event. Our panellists discussed the challenges they have faced in their education provider and how as IT professionals, they overcame these challenges. We also opened the floor up to our selected guests so that the panel could try to help […]

What is Conditional Access, and why is it an essential part of your security posture?

By now, you should be aware that the modern digital landscape is full of threat actors. That are always looking for any opportunity to find a weakness in a business’s security posture and then leverage this to gain unauthorised access to data for malicious reasons. To protect against these attacks, we often look at antivirus […]

HAFNIUM and Exchange Vulnerabilities – What To Do Now…

There has been lots of noise in the press and on social media about the HAFNIUM threat actors and the current vulnerability that has been detected in all current versions of Exchange on premise. If you haven’t read up on the attack and the risks you can do so here; https://www.bleepingcomputer.com/news/microsoft/microsoft-march-2021-patch-tuesday-fixes-82-flaws-2-zero-days/ https://www.kaspersky.co.uk/blog/exchange-vulnerabilities/22385/ https://www.volexity.com/blog/2021/03/02/active-exploitation-of-microsoft-exchange-zero-day-vulnerabilities/ These articles […]

Looking for a technology partner?
Let’s talk

  • This field is for validation purposes and should be left unchanged.