Knowledge Centre

Win 7 Time Glass
Windows 7 Extended Security Updates

The time has finally arrived! On January 14, Microsoft formally announced the end of support for Windows 7. If you…

Gone Phishin’ – What to do if you suspect an attack

Recently, I have had many conversations with connections in several industries that have encountered a recent run of phishing emails.

Executive Guide | CASB 2.0 the next generation of cloud app security

More and more of our critical data, applications and infrastructure are moving from behind the firewall to the cloud –…

The shift of workloads into the cloud continues at an unprecedented pace as organisations seek innovation and productivity gains. However, as more and more apps and services move to the cloud, corporate data is often exposed in ways and places that you never imagined.
Solving the cloud security conundrum

The shift of workloads into the cloud continues at an unprecedented pace as organisations seek innovation and productivity gains. However,…

An Introduction to Symantec CloudSOC

A New Solution for Cloud App Security Symantec CloudSOC is a next generation cloud access security broker (CASB 2.0) solution…

Clinging to the Windows 7 Ledge: Are You Ready to Make the Leap to Windows 10?

Business is all about balancing risk and opportunity. Nowhere, perhaps, is this clearer than in the IT department, where the…

Azure Security Blog
4 Azure security features you must know about

Hosting on the Microsoft Azure platform is a fast and simple method to deploy and manage web-based applications. Countless…

The Office 365 security features you didn’t know existed

When you use Office 365 every day, it can be easy to forget just how powerful it has become…

Are your critical systems heading for the ICU? Prepare for Windows 7 and Office 2010 end of life.

Imagine being critically ill in the back of an ambulance, when just minutes from your nearest hospital you’re suddenly diverted…

Don’t just discover the cloud, control it!
Don’t just discover the cloud, control it!

End-users move constantly between devices and locations to access data when and where they need it for uninterrupted productivity. There…

A new model for safe and secure Windows patch management

I’ve seen a lot of evolution in desktop operating systems (OS), both in the product itself, and how it has…

Cyberattacked Disaster Recovery
Facing the threat of cyberattacks: how does your disaster recovery solution stack up?

It’s a message every IT manager dreads. ‘Your personal files are encrypted by CTB-Locker. To decrypt the files, you need…