

In face-to-face seminars, it’s easy to keep track of your audience and register when you’re losing their attention. In webinars, your control is limited, and attendees are more prone to distraction. But all hope is not lost!
Curious how you can capture the attention of your audience for the entirety of...


2019 is off to an action-packed start in cybercrime. From a steadfast increase of pervasive Trojans to a resurgence of randsomare logdged against corporate targets, cybercriminals are going after organizations with a vengence. Read the Cybercrime Tactics and Techniques Q1 2019 Report to learn more about the current state...


Star’s virtual desktop provides a platform for the delivery of a working, personal desktop for different user groups, regardless of location or device. Utilising the latest technologies, the service delivers significant efficiencies and productivity gains, while reducing the burden of hardware management and security...


Broken links disrupt employees' work and lower productivity as they seek out inaccessible data..
Companies that do not address this growing problem face fustrated users, lost productivity, and lost confidence in business information.


Whether they result in fraudulent wire transfers, misdirected payments, diverted payrolls, supply-chain fraud or exposed personal data, BEC and EAC attacks are growing. The good news: these threats can be managed. With the right technology, tighter fiscal controls and a people-centric approach to stopping them, you can...
Published: Apr 21, 2021


Security teams have a difficult task to perform, and it’s not getting any easier. IT environments are becoming more complex, threats are becoming more sophisticated, and the number of known vulnerabilities is dramatically increasing. In addition, there is a critical shortage of skilled IT security specialists, and...




Ransomware isn’t new. In fact, it’s 30-years-old . What IS new is ransomware’s sudden rise as a favored attack by cyber criminals . Cyber crime has become a lucrative business and, unfortunately, ransomware has become an integral attack method that many organizations are fighting a losing battle against. ...


Business email compromise (BEC) and email account compromise (EAC) are complex problems that require multi‑layered defences. Cyber attackers have countless ways of tricking your users, preying on their trust and exploiting their access to key data, systems and resources. To succeed, attackers need to find just one tactic...
Published: Apr 21, 2021


In a relatively short space of time the cloud has become the foundation upon which organisations build their digital infrastructure – and with that every business must confront security issues. As cyber attackers become more sophisticated and find inventive ways to navigate around traditional endpoint security, it’s...


Retail cybersecurity in the age of the omnichannel customer experience requires CIOs and vice presidents of IT to take a 30,000-foot view. Supporting multiple point-of-sale (POS) solutions, an assortment of cloud-based applications, distributed networking software, customer mobile devices, and other emerging technologies...
Published: Jan 19, 2021


In the changing landscape, security and risk management leaders must ensure that existing security solutions keep pace with fast-changing threats. It’s clear that the defend-the-perimeter model of security hasn’t worked for years and it’s time to make a change—and today that means starting protection...
Published: Jun 17, 2021


This easy-to-read book gives you jargon-free best practices for Software-Defined Wide Area Networking. Includes a special foreword by Lee Doyle, Doyle Research. Co-authored by Dan Pitt, Open Networking Foundation.
Download the eBook and learn:
The need for SD-WAN adoption for branch networking
Benefits...


With the global success of iPhone and iPad, many businesses are embracing the Apple platform. Along with these mobile devices, sales of Mac computers to business are growing. A decade ago, the Mac was an uncommon sight in many businesses and routinely ignored by corporate IT. Today, more and more business users and IT...