Amazon WorkspacesWork from anywhere really can mean work from anywhere with an Amazon Workspace. In this webinar we take a quick look at Amazon...
Quickly Scan Documents While On-The-GoNeed to get those printed and signed documents attached to an email while on-the-go or working from home? It's simple to do using an app...
Remote Access Tips & SecurityWith everyone rapidly moving to work at home, remote access to the work environment is more important than ever before. This short...
FTP misconfiguration and Cleartext ProtocolsA common mistake with FTP is leaving anonymous login enabled. This will allow anyone to login and see the files and folders on the FTP...
Ransomware Incident ResponseIn this webinar we discuss ransomware and how it affects your computer, as well as some tips on how to deal with it or avoid it if possible.
Common Vulnerabilities and Exploits Series - Episode 9 - Man in the Middle AttackA Man in the Middle attack (MITM) occurs when a third party discretely intercepts and possibly alters communications between two...
Common Vulnerabilities and Exploits Series - Episode 8 - Cross Site Request ForgeryCross Site Request Forgery (CSRF) is an attack that makes a web browser perform an unwanted action on an application that is already...
Common Vulnerabilities and Exploits Series - Episode 7 - Web Site Directory TraversalSimple Video showing what a directory traversal is and why it is concerning. This is something that web developers often overlook.
Common Vulnerabilities and Exploits Series - Episode 6 - SQL Search Get ErrorWeb pages that make use of an SQL instance can expose all of your information if not properly implemented.