Why foiling phishing attacks means much more than just punishing users for falling for them. Some organisations put a lot of effort into training their staff to detect and evade phishing attacks. Some even punish them if they slip up. It’s easy to see why the user has been identified as a central factor in phishing prevention – successful phishes … Read More
Eircom Connect 7.3
The last time we covered Ericom, they’d renamed their flagship product to Ericom Connect along with their 7.0 release. That release brought about a complete rewrite of their platform that focuses on scalability, ease of use, and reporting. It relies on an in-memory grid that is spread across multiple Connect servers that can support 100k concurrent users with room to … Read More
How Much is Cloud About Cost ?
Is your focus on the cost savings of cloud computing hiding the true benefit ? Read any article that advocates the adoption of the cloud and in the first one or two paragraphs, inevitably they will discuss how much money a business will save. Keeping up to date with current technology, having to fix a server that crashes, hiring an … Read More