When can you finally forget your passwords?
Passkeys are set to take over from traditional passwords to give us a safer, more secure way of logging into our online accounts.
Passkeys are set to take over from traditional passwords to give us a safer, more secure way of logging into our online accounts.
Kerkhoff Technologies Microsoft Teams is a lot of things. It’s a video conferencing tool, a team messaging channel, and a tool for in-app co-authoring, just to name a few. During the pandemic, the popularity of Teams skyrocketed. User numbers for MS Teams jumped from 20 million in November 2019 to 75 million in April 2020.…
Kerkhoff Technologies Have you ever bought a new computer and then had buyer’s remorse a few months later? Maybe you didn’t pay attention to the storage capacity and ran out of space. Or you may have glossed over memory and experienced constant freeze-ups. An investment in a new PC isn’t something you want to do…
Almost half of people with social media accounts admit to falling for shopping scams. If your team are shopping at work, is your business protected?
Kerkhoff Technologies Paying attention to your customer experience directly impacts your bottom line. Companies that are “customer-centric” are 60% more profitable than those that aren’t. In this digital age, customers also expect more from those they do business with. In today’s world, people can order something on their phones and see it on their doorstep…
Zoom is looking for a piece of the MS Teams action with the launch of a whole suite of features and services
Kerkhoff Technologies Just five or six years ago, VoIP was still considered a “different” type of business phone system. One that wasn’t the norm. But the pandemic changed that way of thinking. Now internet-based phone systems aren’t simply the norm. They’re mandatory for business continuity. During the pandemic, VoIP and video conferencing have skyrocketed by…
Fake Flash messages are being used as a cover for a new ‘botnet’ campaign. If you use Google Chrome or Microsoft Edge you could be a target.
Kerkhoff Technologies Endpoints make up much of a company’s network and IT infrastructure. This is a collection of computers, mobile devices, servers, and smart gadgets. As well as other IoT devices that all connect to the company network. The number of endpoints a company has will vary by business size. Companies with less than 50…
Kerkhoff Technologies One of the most difficult types of attacks to detect are those performed by insiders. An “insider” would be anyone that has legitimate access to your company network and data. This would be via a login or other authorized connection. Because insiders have authorized system access, they bypass certain security defenses. Such as…