Cloud Consultancy News
Office 365 Is Coming To The Mac App Store
Apple have announced that Microsoft has agreed to offer Office 365 for download from the Mac App Store, which is being revamped for macOS Mojave. “We’ve talked to some developers [about the new Mac App Store] already, and they’re really excited to,” Apple’s Ann Thai...
How Can I Secure My IoT Devices At Home And At Work?
With every day that goes by more IoT (Internet of Things) devices are becoming a part of our normal everyday life both at home and on the job. In recent years it has become evident that IoT devices pose a security risk for any network. While IoT manufacturers are...
Microsoft Introducing Age Requirements For Office Add-Ins – GDPR
As part of Microsoft’s commitment to making sure that products and services comply with General Data Protection Regulation (GDPR) they are implementing age requirements for minors to be able to download Office add-ins from the Store. This change is rolling out now for...
Phishing Techniques To Look Out For – Links
Knowing that many security systems scan links within emails to determine if they’re hacking, hackers often embed phishing links within clean attachments. As there is no malware in the attachment, the message won’t trigger 'sandboxing' technologies; and because there’s...
Phishing Techniques To Look Out For – Emails & Homoglyphs
Homoglyph Attacks With homoglyph attacks, hackers leverage the similarities of character scripts to create and register phony domains to fool users and lure them into visiting fake sites. For example, they’ll often replace the Latin small letter "o" with Cyrillic...
Microsoft Rolls Out KB4103714 for Windows 10 1709 Fall Creators Update
Microsoft have rolled out cumulative update KB4103714 for Windows 10 1709 Fall Creators Update. Here’s a look at what to expect. If you held off on updating to Windows 10 1803, you should know that Microsoft have now released cumulative update KB4103714 for version...
Phishing Techniques To Look Out For – Cousins Domains
Cousins domains can be created and used to spoof both the sender and the URL. With this technique hackers will remove letters or alternate the spellings to a registered domain name, so it looks deceptively similar to a target name. Here’s an example of a real address...
Apple, Spurned by Others, Signs Deal With Volkswagen for Driverless Cars
Apple once had grand aspirations to build its own electric self-driving car and lead the next generation of transportation. Over time, the tech giant’s ambitions ran into reality. So Apple curtailed its original vision, first by focusing on software for self-driving...
Cloud-based Software: Is It Right For Your Business?
The reality of technology is often different than what is popularly portrayed: in the vast majority of cases, there are tangible advantages and disadvantages associated with any new innovation, and businesses are forced to make necessary compromises as a result. The...
Compliance Is Not Synonymous With Security
While the upcoming GDPR compliance deadline will mark an unprecedented milestone in security, it should also serve as a crucial reminder that compliance does not equal security. Along with the clear benefits to be gained from upholding the standards enforced by GDPR,...