


Office 365 and Multifactor Authentication
This shouldn’t need to be said, but unfortunately it does. If you are using Office 365 in any capacity you should have a strong password. More importantly, you should have multi-factor authentication (MFA) configured and turned on. If you don't, then why not? I'd be very interested to hear a…
How to Protect Against 99% of Cyberattacks
Microsoft have released their Digital Defence Report for 2023. The report makes for interesting reading. We have highlighted below the report’s key section regarding how to protect against 99% of attacks. Microsoft comments, “While we explore the many dimensions of the cyber threat landscape, there is one crucial point we…
All About Cloud-based Phone Systems
What are cloud-based phone systems? A cloud-based telephone system is one that allows you to make calls over the internet rather than a traditional analogue phone line. They are also known as VOIP, cloud PBX or a hosted PBX system. Why would we need a cloud-based phone system? …
All About Vulnerability Testing
What is vulnerability testing? Vulnerability testing is designed to identify any weaknesses in your IT network. The results of which will tell you where and how to strengthen your organisation’s IT security. Why is it important? Left untested, if you have any weak spot you don’t know about, these…