Jul 223 min readDo you trust Entrust?Peter Hanney discusses Google's decision to distrust Entrust certificates and what this means for customers.
Jun 73 min readA Practical Approach to Managing Legacy Systems & DataThrough Technology explain our proven approach to Legacy Technology and Data Management, as part of TechUK's Digitising Justice Week 2024.
Jun 33 min readG-Cloud 14 - Predicting the futurePeter Hanney discusses why Namespace Protection is critical for all large organisations.
Feb 9, 20224 min readWhen Phish slip through the net….How to empower your Office 365 users to remove and report Phishing emails with just two mouse clicks.
Dec 20, 20214 min readMeetings Meetings Meetings!Rob Chorley discusses the productivity lost to diary-juggling and meeting organisation. Sharing a great, free and secure way to fix it.
Mar 30, 20218 min readSpending time with the world's most advanced natural language AI.Through Technology's Nick Mannouch shares thoughts and findings from working with the world's most advanced Natural Language Processing AI.
Feb 8, 20183 min readEvil Jay & the Missing Step in Office365 Government Email SecurityWe describe what email spoofing and phishing are, and one key step you should take to manage a gap in Office 365's implementation.
Jun 30, 20171 min readNotPetya / GoldenEye - First thoughtsUpdate 29/06/2017 - Microsoft have recently published the following: https://blogs.technet.microsoft.com/mmpc/2017/06/27/new-ransomware-o...