Backups and recovery, Office 365, Windows
Microsoft 365, often called M365 or previously Office 365, is a cloud-based suite of productivity tools that includes familiar apps like Outlook, Word, Excel, PowerPoint, ...
Unlocking endpoint security management excellence with SentinelOne XDR and MDR
In a world where cyber threats are growing smarter by the day, keeping your organization’s devices secure is no longer just a technical necessity – ...
Cybersecurity and business continuity
Can KnowBe4 really turn your employees into a human firewall?
Cybersecurity threats are evolving faster than ever, and organizations are under constant pressure to keep their defences up. While firewalls, antivirus software, and network monitoring ...
ZTNA – what is it and how does it work?
If you’re an old-school IT professional, you’ve probably set up countless SSL VPN connections to connect remote users to the workplace in a secure manner. ...
Five facets of a disaster recovery plan you can’t afford to neglect
A disaster recovery plan is what an organization should have in order to triage certain items on its network, such as systems, infrastructure, databases, and ...
5 practical steps to avoid a cyber attack
For a long time, a cyber attack seemed to be a problem that only affected the largest multi-billion dollar corporations. But as these organizations have ...
Virtual Wire Pairs – improving network security without extra hardware
Ever found yourself in the unfortunate circumstance of having to support devices on your internal network that tend to pose a higher security risk than ...
Coronavirus scams: what to look out for and how to stop them
The world has quickly changed over the past few weeks, but the one thing that hasn’t is the inclination of shady characters to exploit individuals ...
The top security trends to watch for
In this article, we look at some key Information Security trends to look for, along with the things you need to consider if you want ...
Backups and recovery, Cloud computing, IT strategy, Servers, Virtualization, Windows
Storage Spaces Direct deployment best practices
Introduced in Microsoft Windows Server 2016, Storage Spaces Direct (S2D) is Microsoft’s new software-defined storage solution that allows enterprises to create logically defined storage volumes ...
Firewalls, Office 365, Security
How to protect your Office 365 tenant – essential implementation steps
With many organizations choosing to move services to the cloud, the difficulty for most is related to the overall Security within the Cloud. If you ...
Monitoring, Networking, Security, Wireless
Using Aruba ClearPass for Network Access Control [Use Cases]
Organizations today love the idea of anywhere, anytime connectivity, but in their rush to get everything connected, often ignore the need for secure Network Access ...
12 Dos and Dont’s at Christmas for trouble-free IT
It’s the holiday season—many of us have already given thanks, and some of us are now celebrating with friends and families. Some of us fortunate ...
Malware evolution, or in other words, “all your data are belong to us”
It’s a twist on a popular internet meme based on a phrase from the classic arcade game, Zero Wing. Only, in this case, it’s not ...
Gmail IP address ranges – here’s how to find ALL the public ones
If you’re like most firewall administrators, you dislike the idea of opening up port 25, 465, and 587 for outbound traffic to the -entire- internet. ...


