
Device Control: Do companies need to have full control over your devices to secure it?
Companies go the extra mile to keep their confidential data safe. They often outsource their cyber... Read Blog »

September 06, 2022

Cyber Insurance 101: Cyber Insurance and Risk Management for Beginners
Cyber threats are everywhere! And they are attacking small and medium-sized businesses like never... Read Blog »

August 31, 2022

Firewall 101: What firewalls can and cannot do
Nothing gets through a firewall! – Says no IT geek ever. Read Blog »

August 16, 2022

Essential 8 Cyber Security: The Strategy You Should Implement
You may not have come across the Essential 8 cyber security framework before, however, if you're an... Read Blog »

June 16, 2022

Microsoft Office Zero-Day “Follina" – What is it and how can you prevent it?
There’s a new zero-day vulnerability in Microsoft Office discovered last May 27 by nao_sec, a cyber... Read Blog »

June 03, 2022

7 Steps to recover from a ransomware attack
Ransomware is a type of cyberattack often used against companies of all sizes. Once the malware... Read Blog »

May 24, 2022