International eSecurity Compliance

It feels it’s like a daily occurrence for one of our clients to be asking for assistance with a security compliance questionnaire from their client. Most of these are being driven by corporates with international footprints. This becomes complex as each...

Damn – I just “corrupted” that document

It happens to all of us. The IT geeks tell us all to save our work to the cloud (or server for those still  to move), but it’s just so convenient to have it on the desktop. We all do it.  It could be a spreadsheet you want to work on or a document that a client shared...

Is “Deathstalker” coming for you?

Cyber-Crime is big business.  The criminals are organised and sophisticated.  Imagine if they put their ingenuity to things that are good?  But alas, that’s not reality.  Instead we have to brace ourselves to deal with another wave of crime. Deathstalker is a...

Automating our own business processes with Microsoft 365

Normally our case studies reflect work we’ve done with clients. This time we wanted to share how we’ve used our own services through lockdown to automate a key business process. One of the challenges we’ve always had is that it can be really hard to know how long a...