Office365 backup and compliance
For most businesses, their email system holds some of the most important data in the organisation. In the traditional SME environment where you manage your own servers either on premises […]
For most businesses, their email system holds some of the most important data in the organisation. In the traditional SME environment where you manage your own servers either on premises […]
If you’re an IT administrator or poweruser, you’re probably aware that the range of browsers which support the Java and Silverlight plugins has been slowly shrinking. This has affected the […]
There have been a lot of stories recently in the technical and mainstream press about ransomware. While they admirably cover the details (and generate a fair amount of anxiety in […]
What is Shellshock? Shellshock is the name given to a vulnerabilty in Bash, the default shell (or command interpreter) on Linux, MAC OS X and other related operating systems. It […]
[Last updated May 5th 2014] What is heartbleed? Heartbleed is a vulnerability in the OpenSSL library used by many products and servers to secure web-based traffic. The vulnerability allows small […]
It is that time of year again. Christmas is long gone and the New Year is well under way, and your thoughts turn back towards IT budgets. Whether you are […]
There’s no doubt that most companies who choose Office 365 do so for the email capabilities and Microsoft Office rights. But especially if you’ve chosen an Enterprise plan, there are […]
The latest figures show that nearly 30% of desktop users are still running Windows XP. The bad news for those users is that Microsoft is ending support for Windows XP […]
From 1st January 2014, browser and certificate authorities will only be supporting 2048 bit RSA keys and larger. This is for security reasons – the general belief is that 1024 […]
There is a rich ecosystem of addons and tools for VMware, but the one we often install at most of our sites is Veeam Backup & Replication. Every system should […]