Technical Blog

/data/file/ab3013eb6dda1ee6b39744ddd280e79c.png

Log4Shell Vulnerability

A vulnerability has been discovered in a piece of software called "Log4j". This software, developed by Apache, is in millions of other applications to process logging information. Some high-profile use cases are the video game Minecraft, Apple iCloud, Amazon, Twitter, Tesla, the list goes on.

Read more
/data/file/ab3013eb6dda1ee6b39744ddd280e79c.png

Ransomware and what you can do about it

You’ve probably heard of it, and you know it’s not good news. Here’s what you need to know about ransomware and what you can do about it.

Read more
/data/file/ab3013eb6dda1ee6b39744ddd280e79c.png

Router vs Firewall

Many businesses nowadays require users to access resources remotely. That could mean a remote-access VPN for users in the field, a website hosted on a server within the network, or a remote desktop solution for people working from home. All of these systems are a potential target for attackers. Upgrading your standard issue ISP router will greatly improve your security.

Read more
/data/file/8802b5046fe71fef9ff63d26b798f8d7.jpg

Why you should ditch paper and switch to Microsoft Forms

Are you still using paper forms to collect data – from customer satisfaction surveys to employee feedback? It’s time to make the switch to digital.

Read more
/data/file/dfd3291e1e793ebb2710abd0924173d9.jpg

Working from home – are you there for the long term?

With a lot of us now working from home for the majority of the week, it’s a good time to have a think about what equipment we have around us and if it’s fit for long-term use. Here are our top 10 things to consider.

Read more
/data/file/f3abd853f96d26cdb85476b5291fca3d.jpg

Getting the most out of your Teams Telephony

Whether you’re talking to colleagues two floors up, or 200 miles away, Teams is a great collaboration tool. Even the free version can help people communicate and collaborate – either within, or across, organisations. So why should you add Teams Telephony to your package?

Read more
/data/file/aacfad827e9423bf2ac292839e9b7124.jpeg

What is the most secure MFA method?

MFA stands for Multi-factor Authentication. It means users have to provide two or more verification factors to access a resource, such as an application, online account, or VPN. If you have MFA on all your business and personal online accounts, then you are already more secure than 85% of businesses. Let’s compare the various MFA methods available and see how we can make your account even more secure.

Read more
/data/file/502c39e24377bb797e386de78c52d38e.jpg

In Out, In Out, Shake It All About!

Will you return to the office? Would you prefer to stay working from home? Or are you looking to offer your staff a mix of both?

Read more
/data/file/ccead209edcfb6c835ede23a17e77726.jpg

The Spam Test

Scammers have become increasingly competent over the years which has made spotting malicious emails more difficult. Whilst It is still the case that the grammar and general sentence structure tend to be poor, this has reduced as foreign attackers have got more proficient and translation tools have improved.

Read more

Type...

Get in touch

Call us on 0333 000 3210 or Email us solutions@datcom.co.uk