Loading...

KRACK WPA2 security vulnerability update

Late Monday a serious vulnerability in the Wi-Fi security protocol known as WPA2, was announced worldwide. This vulnerability has been named KRACK, a portmanteau of Key Renegotiation Attack. WPA2 is used universally as the most secure of the wireless encryption protocols, the previous protocols being WEP and WPA. This vulnerability applies also to WPA, and [...]

By | October 18th, 2017|Managed Services, Ransomware, Security|0 Comments

Employee Spotlight: Chris Cox

Diamond actively recruits and keeps the best ICT brains in the market. Our staff are recognised industry leaders, innovators and all round impressive people who all have great stories to share. We’d like you to meet our Presales Team Leader and Engineer – Chris Cox. 1. What is your role at Diamond? My role here [...]

By | October 11th, 2017|Articles|0 Comments

Virtualisation can save SMBs from disasters

Natural disasters can be brutal and unexpected for any small business. Regardless of your organisation’s location, you need to be prepared for any kind of disasters, natural or manmade. Virtualisation is one of your best bets for staying operational through thick and thin. Virtual desktops In most offices, employees are still dependent on desktop computers. [...]

By | October 3rd, 2017|Business Value, Office 365, Productivity|0 Comments

OneNote: the hidden gem in Microsoft Office

Almost everyone loves PowerPoint, Excel and Word, but there’s another Office application that should be recognised as a must-have: OneNote. It’s an app for pulling together text, video, audio, and other visual resources to create shareable notebooks full of useful information. With this article, you can master OneNote in no time at all. OneNote is [...]

By | September 25th, 2017|Business Value, Office 365, Productivity|0 Comments

What is BI, and why should you care?

Small to Medium Businesses (SMBs) have data needs that are comparable to large enterprises. While they don't match enterprises in terms of data volume, they often do in complexity. In very small companies, spreadsheets and other ad hoc tools are good enough to get the job done. But as companies grow, the amount of data [...]

By | September 22nd, 2017|Business Intelligence, Business Value, Software Development|0 Comments

Why we don’t always recommend Cloud

In the last 5 years or so, ‘Cloud’ has certainly become a hot topic and rightly so. There are many benefits to be gained from Cloud based technology, as computing resources and software application can be managed and delivered to customers via the Internet, on many different platforms and devices. The pricing structure of Cloud [...]

Employee Spotlight: Brooke Jackson

Diamond actively recruits and keeps the best ICT brains in the market. Our staff are recognised industry leaders, innovators and all round impressive people who all have great stories to share. We’d like you to meet our Senior HR Advisor – Brooke Jackson. 1. What is your role at Diamond? My role here at Diamond [...]

By | September 12th, 2017|Articles|0 Comments

Is your email on the spam list?

Have you been meaning to change your password lately? Now is always a good time… As recently highlighted in a number of online blogs, the email addresses and passwords of 771 million people have been published online during a gigantic data leak… Personal data collected by a “spambot” called Onliner has been dumped on a [...]

By | September 7th, 2017|Managed Services, Ransomware, Security|0 Comments

New Locky Ransomware – what you need to know..

While Petya and WannaCry grabbed all the headlines recently, they were largely unsuccessful in that they made almost no money from ransoms – not so with Locky. The Locky ransomware was much more successful in this area, in what has been estimated as a $1 billion USD revenue for ransomware in 2016. Around the 1st [...]

By | September 6th, 2017|Managed Services, Ransomware, Security|0 Comments

How to secure your IoT devices…

More firms are using the Internet of Things (IoT) to create new business opportunities. For instance, companies that install smart sensors can automate data entry and monitor their inventory. However, if left unsecured, IoT devices also give hackers an opportunity to breach your network. In order to keep attackers at bay, we advise you take [...]