Uncategorized

Blog categorized as Uncategorized

Today I wanted to try out the new and very awesome Office 365 Attack Simulator for Office 365.

The idea behind it is that there are certain types of hacking attempts that can bypass security protocols based on their nature, such as a phishing scam, brute force password attack or even password stuffin...

09.03.18 07:55 PM - Comment(s)

Hackers do not always do things for money. Sometimes, they just want the glory or a little recognition.

For me, it is extremely satisfying breaching a network or popping a box in front of an IT team who are completely perplexed as to how you rendered their security utterly useless.

Gaining publicity

As...

08.03.18 07:52 PM - Comment(s)

In the past, we have paid a lot of attention to technology and the ways in which it is changing the world.

From education to the way we communicate with each other, technology has become an important influencer and will continue to do so in the years to come. But what happens when technology harnesse...

08.03.18 07:44 PM - Comment(s)

Have you ever wondered how your computer organizes the work that you do? How when you want something, it automatically appears?

Office 365 Secure Score is here to help and has become a key component of the GTconsult bag of tricks.

Put simply, the service analyzes your Office 365 organization’s securit...

02.03.18 07:26 PM - Comment(s)

Over the past three years, business growth has been hard to come by as clients are looking at their expenditure trying to work miracles with the budgets that they have.

This may be in the past. There is some extreme optimism floating around the global markets and it looks like South Africa is opening...

01.03.18 07:23 PM - Comment(s)

Tags