“A cybercriminal only has to be lucky once, while a defender has to be lucky every minute of every day.” – Combating Ransomware – A Comprehensive Framework for Action: Key Recommendations from the Ransomware Task Force. The message we hear from...
What is ‘Shadow IT’? Shadow IT refers to the various web tools informally in use within most organisations. These tools are often chosen without reference to IT or to management in general. They are often used for all the very best reasons. Your colleagues...
Learn why use of Teams is growing at lightspeed: In this webinar we looked at what new capabilities are driving increased usage. We then discussed which are most applicable to kiwi businesses, to help shortcut your learning on which you can apply to your...
Some emails are more than just bad news No one likes bad news! But sometimes it can’t be helped. Sometimes it sneaks up on you. One of the most common ransomware attacks is through a compromised attachment in an email. It’s easy to say “only open stuff you expect” but...
Data Leak Protection (DLP) is the name of several policies in Office 365, setting up what data can, and can’t be, shared and with whom. Imagine being able to automatically identify private information like passport numbers, Health IDs or bank account details and...