It's not uncommon to receive unwanted emails which have managed to work their way through the array of filtering systems in production.  Recently our organisation received such an email - a classic phishing email sent to multiple end user accounts.read more

A common issue with supporting a primarily Windows based user body, is that thanks to the "always on" expectation emboldened by smartphones and tablets, it can be a constant battle to try and encourage end users to restart their computers with some degree of regularity - yes IT friends, you know exactly what I mean! read more

Let’s face it, information security is important.  With more and more data being stored and accessed via the internet, we are becoming increasingly reliant on “third parties” to secure our personal data responsibly.  So how is it that we are seeing so many data breaches and poor practices?read more

As I have mentioned in previous blog posts, I regularly listen to numerous technical podcasts.  A relatively new edition to my listening collection is the information security podcast Risky Business – it’s great!read more

Most users of Office 365 will no doubt be aware of the Clutter folder; for the most part this Clutter folder works pretty well.read more