Cloud Services

AKA-BLOG

Here you will find articles of interest for your success with IT services and technologies. Learn about current and leading techniques, methods and technologies.

Image

Phishing tricks – the Top Ten Treacheries of 2020

Sophos Phish Threat, in its own words, is a phishing attack simulator – it lets your IT department send realistic-looking fake phishes to your own staff so that if they do slip ...

Image

Cybersecurity Awareness and Tips

Cybercriminals Target the Weakest Link Cybercriminals are relentless. The more business protects themselves the more cybercriminals prey on that which the business cannot direct...

Image

Servers at risk from BootHole bug

Another month, another BWAIN! That’s our tongue-in-cheek name for a cybersecurity vulnerability that not only gets assigned an identifier like CVE-2020-10713, but also acquires ...

Image

Cybersecurity During COVID-19: Impact and Solution

Do You Have a Cybersecurity Plan? Running a business requires much planning. Strategy, policy, goals, products, and services need to be considered regularly along with who, why ...