General | March 28, 2023World Backup Day: Tips for a successful small business backup strategy In today's digital economy, businesses have access to more data than ever. As newer...
General | February 10, 2023Five worthy reads: Why should we worry about cyberwarfare in 2023? Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
General | November 21, 2022Are you fishing for tips to thwart phishing scams? "You've inherited a fortune. To transfer the money, I need your bank account credentials....
General | October 27, 2022The recovery: How to overcome a malware attack A report published by Cybersecurity Ventures predicts that by 2031, ransomware will...
General | October 18, 2022How important is cryptography in network security? "Please enter the one-time-password (OTP) that has been sent to your registered mobile...
General | December 29, 2021Understanding Saudi Arabia's new Personal Data Protection Law The processing of data is a long-standing debate among governments, businesses, and tech...
Mobile Device Manager Plus | December 14, 2020Remote troubleshooting made easy with Mobile Device Manager Plus System administrators play a vital role in every organization's IT department, and one of...
Mobile Device Manager Plus | December 11, 2020How a mobile device management solution can help with securing devices in the digital workspace The past decade has witnessed many organizations adapting to a digital workspace,...
General | October 21, 2020Sophisticated phishing Most of us can think of a time when we received a phishing email. In fact, most phishing...
General | August 28, 2020Five worthy reads: Ethical AI: Why is it the need of the hour? Five worthy reads is a regular column on five noteworthy items we have discovered while...