by admin | Jun 16, 2023 | Blog, Cyber security
Cyber security and accessibility – Can the two work together? One of the original tenets of digital security was to protect the user without getting in the way or interrupting what they want to do. We all know that never happened, but how does security impact those...
by admin | Jun 16, 2023 | Blog, Cyber security
New Atomic MacOS Stealer malware identified There’s more Mac malware doing the rounds, actively being sold as malware as a service on Telegram and the dark net. The malware, called AtomicStealer, Atomic macOS Stealer or AMOS, enables nefarious characters to create...
by admin | May 25, 2023 | Blog, Connectivity, Digital transformation, Operating systems
When we discuss digital transformation projects, we tend to concentrate on the hardware, networks, uptime, ROI and all the tangible benefits to business. Rarely do those seeking to undergo such a transformation consider the human factor. You could have the most...
by admin | Mar 12, 2014 | Blog
Is it vain, or even acceptable, to talk about the sort of projects one is working on? It may be vanity; it may be unacceptable to some; but what better way to let people understand a little more about your capabilities and the types of people you enjoy working with?...