Blog

Adrift on a sea of data: Architecting for GDPR

I’ve spent many hundreds of hours listening to sales pitches from technology vendors but it’s only during the last year I’ve started to find them rather depressing. That’s been thanks to the arrival in 2018 of the European Union’s General Data Protection Regulation. For example, I was recently pitched to about one particular company’s...
by Lucia Barancikova

Craziest Computer Viruses Over The Years

These days the idea of a computer virus is an almost nightmarish thing. There is so much everyone wants to save with the security of their computers, so the thought of having...
by Lucia Barancikova

Phishers Are Upping Their Game. So Should You.

Not long ago, phishing attacks were fairly easy for the average Internet user to spot: Full of grammatical and spelling errors, and linking to phony bank or email logins at...
by Lucia Barancikova

GDPR – The deep cleanse of your customer database

Would you rather have one Lamborghini or three Ford Fiestas? It’s all about quality over quantity; a well known concept that can often be overlooked in sales and marketing....
by Lucia Barancikova

How to encrypt email

If you need to send a password, bank details or other sensitive information, you should really use an encrypted service. Here’s how to send encrypted emails to anyone on any...
by Lucia Barancikova

What Features to Expect in SharePoint 2019?

On September 26, 2017, Microsoft unveiled SharePoint 2019’s development plan via blog post which is going on in full swing. The company briefed about the progress in the...
by Lucia Barancikova

Understanding Microsoft 365

In this post, I’ll discuss one of the hottest subjects that my customers want to learn more about; Microsoft 365. Complete User Management What is the function of It when it...
by Lucia Barancikova

Data recovery in the age of ransomware

With recent large-scale attacks dominating headlines, particularly WannaCry and Petya, ransomware is expected to cost over $5 billion in damages in 2017 according to Cybersecruity...
by Lucia Barancikova