This blog post discusses the SPF, DKIM and DMARC mechanisms and how organisations can use them to their benefit. Contrary to popular belief, their role
Two weeks have been left for Australian businesses to make use of the priority registration period and register their domain names under the .au extension.
Have you ever heard of the Air Gap Backups? This blog post discusses Air Gap Backups and how you can use them to your benefit.
It appears two new Microsoft Exchange Zero-Day vulnerabilities are being exploited in the wild. While the exploitation is not yet confirmed, attacks have been launched
The landscape is changing so does the legislation. NIS2 Directive is now a reality for European Union and its members. The Directive comes as a
This infographic is about the 6 most common Phishing Attacks and how they can be detected.
💡Did you know you can upgrade one or all your applications in Windows 11 & 10 (1709, build 16299 or later) using the command-line? The