

Email fraud costs companies around the world billions and can destroy brand reputation and consumer trust in minutes.
The DMARC (Domain-based Message Authentication Reporting & Conformance) standard is the most powerful weapon to date in the fight against phishing and email spoofing.
This Getting Started...
Published: Dec 21, 2021


The employee experience has never been a more critical subject for business leaders. The world of work has been turned on its head, and businesses need a fresh approach to ensuring that their colleagues have the environment, tools and support they need to be at their best. The way this was delivered in the past is no longer...
Published: Feb 22, 2021


Behind almost every cyber attack is someone who fell victim to it. In each case, someone has clicked the wrong link, opened the wrong file or trusted the wrong email. In the 2021 Verizon Data Breach Investigations Report1, 85% of breaches involved human error.
Despite constantly changing tactics, evolving malware...
Published: Dec 21, 2021


Even before Covid-19, 9 to 5 was on its way out. In 2019, 75% of global business leaders already considered flexible working to be the new normal. This was driven by workforce globalisation and technologies that allow us to do our jobs anytime, anywhere; the need to attract and retain top talent has been another factor...
Published: Feb 22, 2021


Business email compromise (BEC) and email account compromise (EAC) are complex problems that require multi‑layered defences. Cyber attackers have countless ways of tricking your users, preying on their trust and exploiting their access to key data, systems and resources. To succeed, attackers need to find just one tactic...
Published: Apr 21, 2021


In the changing landscape, security and risk management leaders must ensure that existing security solutions keep pace with fast-changing threats. It’s clear that the defend-the-perimeter model of security hasn’t worked for years and it’s time to make a change—and today that means starting protection...
Published: Jun 17, 2021


The UK education system has seen dramatic changes in its adoption and use of ICT over the past ten years.
These changes have been shaped by government curriculum and fiscal boundaries, socio-economic factors, such as the consumerisation of IT, and increasing pressure to deliver technology that not only engages pupils...


A key focus is improving the time spent with patients. At present doctors have to return to shared desktops in shared office space to log requests for blood tests, check patients’ records and update files.
An experiment in having desktop computers wheeled around wards had proved unsuccessful. There were no portable...


Star’s virtual desktop provides a platform for the delivery of a working, personal desktop for different user groups, regardless of location or device. Utilising the latest technologies, the service delivers significant efficiencies and productivity gains, while reducing the burden of hardware management and security...


In the changing landscape, security and risk management leaders must ensure that existing security solutions keep pace with fast-changing threats. It’s clear that the defend-the-perimeter model of security hasn’t worked for years and it’s time to make a change—and today that means starting protection...
Published: Dec 21, 2021


This white paper discusses the Office 365 environment, its applicability for organizations of all sizes, and the third party capabilities that Office 365 customers should consider to supplement the platform.
This document also provides a brief overview of its sponsor – McAfee – and the company’s...


Broken links disrupt employees' work and lower productivity as they seek out inaccessible data..
Companies that do not address this growing problem face fustrated users, lost productivity, and lost confidence in business information.


As the number of Apple devices in organizations continues to grow, IT administrators are struggling to keep pace using their existing management tools. With the Casper Suite, organizations can integrate with existing IT infrastructure to inventory, deploy, and secure their Mac computers.


First responder teams at Tube Lines work all day, every day, to ensure safe and timely travel on the London Underground. Tube Lines is re-architecting an iPad app to run as a touch-enabled app on Windows 8 tablets.
With emergency data at their fingertips, responders work faster to protect passengers. Engineers also...