Search the blog:
Malicious cyber activity can take many guises. One attack vector that the UK’s National Cyber Security Centre warns against is a watering hole attack. But what is a watering hole attack? And how can you protect your organisation from them?
We’ve written repeatedly about the importance of effective device management that covers all the devices on your corporate network. As we enter 2022, the time is ripe for an important reminder. How secure are your network peripherals really?
We know that criminal cyber activity has increased since the beginning of the pandemic. Cyber criminals moved quickly to target the new vulnerabilities of our rapidly altered working arrangements. To meet these threats, the security and management of devices has become critical. Endpoint management...
As we pass the year anniversary of the first lockdown, Grant McGregor asks: what are the COVID keepers? A lot has changed in the world of IT over the last twelve to eighteen months. The changes we’ve made to enable our organisations to respond to the COVID-19 pandemic have been far-reaching. And...