3 ways to fill worrying cybersecurity gaps
As businesses of the future evolve to be more digital and more shared, the need [...]
The Former CEO of LifeLock: “Mistakes Were Made”.
If you were looking for better identity protection following a string of massive data breach [...]
Jan
Metadata: What is it?
The BTK killer was caught with metadata. Geotagging can unintentionally help poachers find endangered animals, [...]
IMSA launches remote cyber security assessments
Vessels worldwide are now facing compliance with the International Maritime Organisation’s (IMO) cyber security requirements. [...]
Remote working – striking a balance
Presenteeism has long been associated with working life in the city, viewed by many employers [...]
Apple and Aux Cords
Ah, iPhones. There was once a time when the iPod reigned supreme over portable digital [...]
Jan
.PNG vs .JPG: What’s the Difference?
What’s the difference between a .jpg and a .png? Loss, mostly. Picture this: it’s 2005, [...]
Jan
Meetings in Teams : Microsoft 365 Tool Tips
Problem: Organising meetings can be tedious and time consuming Solution: Microsoft Teams ‘Meetings’ tool Microsoft [...]
Jan
Co-Authoring : Microsoft 365 Tool Tips
Problem: Working together on the same files can prove difficult Solution: Co-Authoring with Microsoft 365 [...]
Jan
The ‘Chat’ feature: Microsoft 365 Tool Tips
Problem: Needing a place to chat and send documents securely that is easier than email [...]
Jan