Scams have long been a thorn in society’s side, cleverly evolving to exploit the latest technological advancements and prey on the goodwill of the unsuspecting. While for the tech-savvy among us, some scams may be laughably transparent – especially the low-effort ones...
M365 groups are a fundamental building block across different services. In this article, we’ll look at the diverse uses of them. Group Types An area that often confuses new O365 administrators is the different types of groups, here’s a short rundown to...
Google for the past two weeks has been rolling out several security updates for users of its Chrome web browser, addressing a plurality of vulnerabilities before attackers could exploit them. The web giant this month promoted...
The following new trainings are being released: Phishing Introduction Content: Phishing is one of those terms that many people may have heard but very few actually have a grasp on. One of the reasons surely is that it’s an umbrella term, and individual attack...
Matthew Perry's official Twitter account was hijacked by scammers this week who attempted to solicit donations from well-meaning fans of the much-loved late actor. The post, which has since been removed from Perry's Twitter account, asked for cryptocurrency donations...