Skip to content
Home

Info & Advice

Blog
Shadow IT refers to the use of systems, devices software and applications that are not authorised or approved by the organisation.
There’s a dirty little secret underpinning the 8th wonder of the world, and it is your own ignorance.
The need to back up data has been around since floppy disks. Data loss happens due to viruses, hard drive crashes, and other mishaps.
The National Institute of Standards and Technology(NIST) Cyber Security Framework (CSF) is one of the de facto frameworks used by organisations to implement security controls and reduce cyber security risks
Misconfiguration of cloud solutions is often overlooked when companies plan cybersecurity strategies.
Imagine you’re going about your day when suddenly you receive a text from the CEO. The head of the company is asking for your help.
Something for everyone (including the hackers)
Cybersecurity researchers uncovered an alarming mobile statistic.
Cybersecurity insurance is still a pretty new concept for many SMBs.
The new year has just begun and it’s a time of renewal as we plan for the possibilities to come in 2023.
With the acquisition of Wellington-based Nspire, Palmerston North headquartered Advantage has staked a firm claim on the government-rich market in the nation’s capital.
Purchase of network engineering specialist adds 15 staff to Advantage’s existing 45.