TECH HEROES

08 9467 9646

Fast Customer Support

Connect with us

Book a Meeting

Mon - Fri: 9:00 - 17:30

Online store always open

Utility

Making the most of your Microsoft 365 apps for your business IT services requires you to adopt appropriate security measures.

Making the most of your Microsoft 365 apps requires you to adopt appropriate security measures for your business IT services.  Microsoft 365 is one of the best collaboration and productivity tools around. It provides users with seamless communication, scalability and supports remote work with various features. The security is also solid due to a wide …

Making the most of your Microsoft 365 apps for your business IT services requires you to adopt appropriate security measures. Read More »

windows, microsoft, logo-6281710.jpg

New PetitPotam attack allows take over of Windows domains

A new NTLM relay attack called PetitPotam has been discovered that allows threat actors to take over a domain controller, and thus an entire Windows domain. Many organizations utilize Microsoft Active Directory Certificate Services, which is a public key infrastructure (PKI) server that can be used to authenticate users, services, and machines on a Windows domain. …

New PetitPotam attack allows take over of Windows domains Read More »

cyber security, protection, technology-3411476.jpg

What is Penetration Testing?

A method of evaluating the security of an ICT system by seeking to identify and exploit vulnerabilities to gain access to systems and data. Also called a ‘pentest’,

Let's Do This

Just write down some details and our customer success heroes will get back to you in a jiffy!

Contact Info

Let's Do This

Just write down some details and our customer success heroes will get back to you in a jiffy!

Contact Info

Book your free IT assessment