Protecting yourself from email attacks

There are a number of ways that people can get information from your organisation in order to launch a phishing attack against you, or to impersonate you whilst phishing someone else.The simplest way of getting this information is to do a search on a search engine like this one. A threat actor can m...

Read More

Google Workspace Links

The purpose of this article is to reduce the frustration of finding configuration settings in Google Workspace's Admin Console.FunctionLinkApply default domain on Chromebook login windows (requires an active Chrome device management license).Google Admin ConsoleAllow a user to enrol Chromebooks into...

Read More

pfSense – OpenVPN Site-to-Site Setup

Before you begin: This tutorial is for an OpenVPN Site-to-Site setup using two pfSense devices, one running an OpenVPN server and the other an OpenVPN client. This tutorial is not for setting up an OpenVPN server for Windows or smartphone clients to connect to a remote network over a VPN...

Read More

1 - 7 of ( 7 ) records