top of page

Insights

Feb 8, 20183 min read
Evil Jay & the Missing Step in Office365 Government Email Security
We describe what email spoofing and phishing are, and one key step you should take to manage a gap in Office 365's implementation.

Dec 13, 20173 min read
Introducing the Bullsh*t Continuum
A warning to solution architects. Know your limitations, stay in touch with the tech or hand down decisions to those that do & trust them

Jul 8, 20172 min read
Want to deploy engaging modern IT? Then start with your applications.....
What is the future of End User Computing Services (EUCS) & why should you focus on your applications, not your infrastructure to deliver it
bottom of page