That is a bit of a mouthful of a headline – not as good as “Snack Attack!” but it does explain this post. This article from Tech Republic outlines clearly the challenges to all business working in the new flexible work space. Remote work causing security issues for system and …
Google’s Threat Horizon Report
Google’s security team have released a report outlining the active threats they have detected against their services. It includes a number of recommendations to help their users improve their security. Here is the blog: Coin mining, ransomware, APTs target cloud: GCAT report | Google Cloud Blog Here is the full …
More phishing email threats in the wild – health check your technical cyber security defences
The SANS Internet Storm diary is reporting a new wave of the Agent Tesla, information stealing, Trojan. JavaScript Downloader Delivers Agent Tesla Trojan – SANS Internet Storm Diary More evidence you need to keep your technical defences up to date. Octagon Technology has a range of managed services and advanced …
Octagon Technology and 365R deals with Shadow IT
Shadow IT is a term that refers to the use of un-authorised or unknown hardware and software in an organisation. Often the board through the IT Department has written a policy for for what can and cannot be used in an organisation for processing their information but when someone finds …
Continue reading “Octagon Technology and 365R deals with Shadow IT”
On the Octagon blog…
Diana has a new post on the Octagon blog today talking about the responsibilities companies have towards the environment and highlighting how 365R is part of Octagon’s response to reducing emissions. This article links back to an earlier article that I wrote about the new iPhone 13, the environmental impact …