Types of Penetration Testing
Cyber security is now one of the biggest issues faced in today’s corporate environment. Every day, you hear about Cyber hackers and Threat actors attacking computer systems and services, stealing…
Cyber security is now one of the biggest issues faced in today’s corporate environment. Every day, you hear about Cyber hackers and Threat actors attacking computer systems and services, stealing…
Traditional backup systems typically are set to run at specific intervals, usually after hours. At this time you create a copy of your data at an exact moment in time…
Virtual machines (VMs) are rapidly becoming a critical part of many organisations infrastructure. This technology is being adopted by organizations of all sizes and reaping a variety of benefits throughout…
What is RADIUS? If you work in I.T you would have heard of something called a Radius server. In most networks, users are authenticated using LDAP and Active directory. A…
When it comes to protecting your organisation from the ever-increasing risks of cyberattacks, preparation is essential to effectively defend against the latest threats. It’s one thing to spend countless hours…
Microsoft 365 is a cloud-based service that brings together all of the well-known services and apps from Office 365 such as Microsoft Teams, Exchange Online, Azure AD, SharePoint Online, OneDrive…
What is the CIA triad? The first thing you think about when you hear the acronym CIA is the Central Intelligence Agency, which is an independent U.S. government agency that…
If you work in I.T, it is part of the role to be given a higher level of access to sensitive data and added privilege to perform the tasks required…
The Purpose of SharePoint Permissions SharePoint permissions can be a little tricky to get a grasp on at first but you will find that they can be quite simple to…
Do you use a wireless keyboard or mouse? If you do then there is a new cyber risk that you need to be aware of called mouse jacking. Mouse Jacking…