Battery Life Blog

Modern Standby operates in two modes: Connected Standby and Disconnected Standby. As the names suggest, Connected Standby allows the device to stay co...
How Safe Are Password Managers

The long and short of it is, password managers are safe to use. But what are the risks associated with them, do they outweigh the benefit and which sh...
The True Cost of Cyber Security Breaches

By considering both the direct and indirect costs of a cyber security breach, businesses can take steps to reduce the risk of a breach and the financi...
EOL-Software-Mobile

In this article we break down why End of Life Software should not be used in business and look at the security risks, lack of support and how you can ...
Administration of M365 AI blog - Teaser image

Microsoft's latest tool, CoPilot has the potential to change the way you work forever. You’ve no doubt heard of ChatGPT, the AI tool that has been s...
Sending encrypted email protection secure mail internet blue computer keyboard

We’ve recently been made aware of a critical vulnerability affecting Microsoft Outlook. The exploit if triggered upon the receipt of a malicious ema...
phising threats

A common form of cyber attack, Phishing emails imitate trusted sources. In this article we show how businesses can protect themselves from financial a...
Hands typing on a laptop

Microsoft announced that it would be increasing prices for several of its business products and services in April 2023 in the United Kingdom. They hav...
Rubber ducky cyber attack usb stick

As technology continues to advance, so do the tactics used by cyber criminals to infiltrate and compromise businesses. One such device, the Hak5 Tubby...