Our Blog

2508, 2021

What is the Zero-Trust Model? How to Approach Security in the Cloud Age.

By |August 25, 2021|

August 25, 2021 By Rhia Prajes The COVID-19 Pandemic has resulted in a massive global shift to remote working, necessitating that IT environments be accessible anytime and anywhere by users [...]

2805, 2021

Microsoft Teams vs Zoom – How do they compare?

By |May 28, 2021|

Virtual meetings are part of the new-normal especially in the past year with Covid-19 disrupting the way people work and communicate with each other. Businesses, organizations and just about everyone, [...]

2301, 2020

Defending Against Illicit Consent Attacks

By |January 23, 2020|

Towards the close of 2019 a new variety of phishing attack surfaced, targeting Office 365 specifically. This attack is notable in that it does not harvest end user credentials (as [...]

Go to Top