Diogo Correa

Email Spam TECH PATROL - Cyber Security

What Exactly Does A Phishing Campaign Look Like?

Please note: For privacy reasons the identity of the hacked account in the example used for this blog has been changed. In our previous email security education blog we reviewed trending email security threats. In this blog we’d like to show you what a phishing campaign looks like, and its scary consequences.  Bad actors (hackers, spammers, scammers, …

What Exactly Does A Phishing Campaign Look Like? Read More »

Tech Patrol

It’s Time To Consider An MSP

IT staff is spending too much time focusing on functions like email hosting and backup, Customer Relationship Management (CRM) applications, data backup, storage and network monitoring that they really never get time to actually focus on strategic projects, then it is really time that you as a business leader consider the services of a Managed Service Provider (MSP).

Microsoft O365 backup

6 Critical Reasons To Backup Your Office 365

As a robust and highly capable Software as a Service(SaaS) platform, Microsoft Office 365 fits the needs of many organizations perfectly. Office 365 provides application Availability and uptime to ensure your users never skip a beat, but an Office 365 backup can protect you against many other security threats.

AWS-Azure-The-Difference-Tech-Patrol

AWS v AZURE: The Difference

As the industry changes and the general notion being “If you haven’t migrated to the cloud you are falling behind.” businesses are scattering to two major players and they are Amazons AWS platform and the major rival, Microsoft Azure. This article is designed for you to gain some understanding the difference between the two so you can be ahead of the curve and prepare for a sustainable and most of all cloud infrastructure that can scale with your business projections.

Cyber Security

Is Cyber Security Keeping You Up At Night?

When it comes to mobility, the issue of secure wireless connectivity can keep IT staff awake at night. Businesses are relying more and more on smart devices and gadgets to save money, time and effort but unsecured smart devices can leave a business exposed and provide a backdoor to its network.

Checklist for O365Migration

Office 365 Migration Checklist

Depending on the size and complexity of the migration, there are a variety of actions that you will need to perform. Most of these are performed within the Migration Planner, in response to Alerts in the Migration Dashboard, or as directed by Help Center articles. Now You’ve done your research and have decided that to move your company’s on-premise content to the cloud. What’s Next? This article will look at answering that question.

Managed Services - IT providers

Are You Ready To Transform Your IT?

Running your own technology infrastructure environment can be stressful and at times it can steer you away from actual business goals. There is a miss conception that outsourcing your IT brings vulnerability to being cyber attacked, however, this is completely false and in fact, outsourced IT providers are more secure since they deal in these environments on a day-to-day basis. There will come a time when every business needs to consider the benefits of outsourcing.

SonicWall - Tech Patrol

Analysing SonicWall’s Real-Time Deep Memory Inspection

SonicWall Real-Time Deep Memory Inspection technology enables SonicWall Capture Advanced Threat Protection (ATP) to catch more malware faster than behaviour based sandboxing methods, with a lower false positive rate. Throughout this article we will look deeper into this technology and what this all means from a security stand point.

Scroll to Top