window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'UA-27228569-3');
2502, 2022

Log4j Exploit: What SMBs Should Know

By |February 25, 2022|Categories: Security|Tags: , , , , , , , , , , , , , |

At the end of 2021, news emerged of a new vulnerability in Log4j, a Java library that underlies many of the world's applications. Since then, this security flaw has been widely recognized as one of the most potentially dangerous vulnerabilities in history. This vulnerability introduces a new significant risk for [...]

1102, 2022

How to Use Video Conferencing to Improve Employee Training

By |February 11, 2022|Categories: Security|Tags: , , , , , , , , , , , , , |

In today’s workplace, more and more is happening over video conferencing tools. While there are many advantages to leveraging video in different functions across the business, employee training has seen increasing benefits. Video conferencing opens a whole new virtual world for employee training. Through video conferencing software, like Zoom or [...]

Go to Top