Power Automate: Microsoft 365 Tool Tips
Microsoft 365 is at the top of the pile when it comes to applications of [...]
Feb
Lists: Microsoft 365 Tool Tips
As mentioned in the previous blog in the series, Microsoft 365 has revolutionised the way [...]
Feb
Censoring Image Info: Do it Right
Redaction. Once upon a time, I stumbled into a forum thread about image censorship. The [...]
Feb
Future of working: The growing need for robust remote working solutions
What does the future of work really look like? Unlock the full potential of cloud-based [...]
3 ways to fill worrying cybersecurity gaps
As businesses of the future evolve to be more digital and more shared, the need [...]
The Former CEO of LifeLock: “Mistakes Were Made”.
If you were looking for better identity protection following a string of massive data breach [...]
Jan
Metadata: What is it?
The BTK killer was caught with metadata. Geotagging can unintentionally help poachers find endangered animals, [...]
IMSA launches remote cyber security assessments
Vessels worldwide are now facing compliance with the International Maritime Organisation’s (IMO) cyber security requirements. [...]
Remote working – striking a balance
Presenteeism has long been associated with working life in the city, viewed by many employers [...]
Apple and Aux Cords
Ah, iPhones. There was once a time when the iPod reigned supreme over portable digital [...]
Jan