Information Security
Beyond Office: Microsoft 365

Beyond Office: Microsoft 365

During my time at the Microsoft Inspire conference in Washington DC, I attended three Vision Keynotes presented by senior Microsoft leaders. The first Vision Keynote focused on the anticipated paradigm shift from cloud/mobile technology environment to Intelligent... Read more
Ransomware Strikes Again

Ransomware Strikes Again

Overnight on the 28th of June, a new ransomware cyber-attack (dubbed 'GoldenEye', previously referred to as 'Petya') started to spread throughout Ukraine, parts of Europe and America. Several Australian companies have also reported being impacted by the ransomware... Read more
Do You WannaCry?

Do You WannaCry?

What is Ransomware? Ransomware is malicious software (malware) that runs on your computer and either locks you out, or encrypts your files until you pay a ransom. Ransomware has been around since the late 1990s, and aided by the internet has been plaguing more and... Read more
The Differences Between Hubs, Switches, and Routers

The Differences Between Hubs, Switches, and Routers

When you are talking about networking in business, usually with your IT provider, you might find that the terms "hub", "switch", and "router" are being used interchangeably when they should not be. The reason for the confusion is understandable. Besides looking... Read more
Loading...

Why partner with Veracity?

In the connected economy the technology platform is a value creator. Veracity builds technology platforms for connected businesses & communities.