Similar Posts
The Lowdown on Firewalls
What is a Firewall? It is a device that monitors and filters incoming and outgoing network traffic based on an organisation’s…
Generate Sonicwall Reports
1. Navigate to the “Monitor” tab 2. Go to “CTA Reports” which is located under “AppFlow” 3. To see the reports…
3 Types of Business Email Compromise Scams
Among 11 South East Asian countries, Singapore recorded the highest number of Business Email Compromise scams in 2018, with an average…
Cybersecurity: Ransomware Prevention for Businesses
[2 mins read] Cybersecurity- One of the top grossing topic among businesses worldwide. Technology is a double-edged sword, and cyber attacks…
Installing Microsoft Office
Step 1: Go to the https://www.office.com/ Next click on Sign-in button. Step 2: Sign in with username and password provided. Step 3:…
Shared Responsibility in Cloud Services: Your Responsibilities in Safeguarding Your Data
[6 mins read] While cloud service providers (CSPs) like Microsoft and Google ensure the security of their infrastructure, they are not…
