Blog

Rethink your Microsoft 365 and AD password policy

Malicious hackers have an enormous trove of common passwords they can use to try and access your network. These lists demonstrate how weak common password choices tend to be. Some common examples of passwords highlight how important a password policy can be:...

Microsoft 365 – Avoid shared user accounts

Shared user accounts are often adopted in situations where a business may have multiple people who need access to the same resources on their network. This happens in situations for example, with roles like reception or with maintenance personnel. All these employees...

Gamify your tasks with Habitica

Building good habits is a lot of work, and while rewarding on a cosmic scale, you don’t always get immediate feedback that you’re doing something good for yourself. If you’re like me, you’ve longed for someone to transform these sometimes tedious tasks into a...

Smart mobile security

Alongside the explosion of BYOD (Bring Your Own Device) policies comes the rise of mobile malware. Take precaution and install a mobile security app. Sophos is a FREE lightweight antivirus and security app. It was the winner of the AV-Test Award in 2015 and contains...