The whole world has been buying personal computers and laptops since March 2020 – the beginning of our transition to remote work. One year later, laptops and their accessories remain the hot-ticket items and the supply is still struggling to meet the demand in 2021. The main reason for the product constraints is the limited…
As security challenges evolve, so do the best practices to meet them. To stay up to date, many I.T. security professionals refer to the top 20 CIS Critical Security Controls (CSC) list, published annually by the Center for Internet Security (CIS). This is a ‘Top 20’ list that can help organizations better defend against known attacks…
With the rise in the use of Microsoft 365 cloud services, these accounts have become very popular targets for cybercriminals. We have seen and heard directly from some clients that they have experienced a surge in attempts via phishing, in particular. These attacks are becoming more sophisticated as they frequently gain prior information about the…