Five worthy reads: Password hygiene – The first step towards improved security

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week let’s go back to security basics with password hygiene—the simplest, and yet often overlooked step in account security.

Passwords …

General 2 min read Read

Zoho’s POPIA compliance statement

The Protection of Personal Information Act (POPIA) comes into force from 1st July 2021. All the organisations that handle personal information whether for their own purposes or on behalf of another business have to comply with certain requirements. Below are …

General 2 min read Read

Five worthy reads: Internet of Behaviors – Exploring beyond the Internet of Things

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week let’s welcome a new acronym to the club — IoB (Internet of Behaviors) and assess its impact.

Organizations are …

General 4 min read Read

OpManager makes network monitoring easy for Heritage Credit Union

About Heritage Credit Union

Heritage Credit Union Limited is a US-based, non-profit financial institution founded in 1934. Today, it serves more than 28,000 members in Illinois and Wisconsin, with $450 million in assets and more than 120 employees. It takes …

General 1 min read Read

Five worthy reads: Confidential computing – The way forward in cloud security

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In light of rising concerns over cloud cybersecurity, this week we explore the concept of confidential computing.

The past year has …

General 3 min read Read

Five worthy reads: Distributed cloud is the future of cloud computing

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. Distributed cloud allows organizations to bring cloud computing closer to their location. This week we look at why it’s the future

General 2 min read Read

Strategic roadmap to ensure Exchange security

With the quantum leap in the adoption of remote work environments, cybercriminals are turning their attention on the security vulnerabilities in these environments. On top of this, protecting remote connections is becoming increasingly difficult because hacking techniques have become more …

General 2 min read Read

Five worthy reads: Anywhere Operations—A new business operating model

Five worthy reads is a regular column on five noteworthy items we have discovered while researching trending and timeless topics. This week, we explore Anywhere Operations as a new business model.

The remote work policies that businesses adopted last year …

General 2 min read Read

Five worthy reads: Location intelligence—the key to next-level data utilization

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week we explore the rising scope of location intelligence in improving the overall customer experience.

The pandemic has pushed businesses …

General 3 min read Read