May Newsletter 2023
We are back! Did you miss us?! We have some amazing updates for you! We have been super busy here at Re-solution HQ! Firstly, a couple of announcements and then on to some cyber-security facts! Re-solution Renews their Cyber Essentials...
Legacy and Next Generation Firewalls. The differences.
Firewalls are an essential component of any network security architecture, as they help protect against unauthorised access and cyber threats. Over the years, firewall technology has evolved significantly, with legacy firewalls being replaced by next-generation firewalls (NGFWs). In this blog...
Think inside the box! A guide to cyber-safety online in 2023…
Cyber-safety is important to protect yourself from online threats such as identity theft, fraud, hacking, cyberbullying, and cyberstalking. Here are some guidelines for staying safe online: By following these guidelines, you can help protect yourself from online threats and stay...
Why a company should invest in a wireless site survey
Why should you invest in a wireless coverage survey? Wireless connectivity has become an integral part of today’s organisations, and it is crucial to have a reliable wireless infrastructure in place to ensure that operations run smoothly. However, even the...
Different types of Wi-Fi and how it has evolved…
Wi-Fi and how it has evolved over time… WiFi, also known as Wireless Fidelity, has come a long way since its inception in 1997. It has revolutionized the way we connect to the internet, making it easier and more convenient...
What is Wireless and how does it work?
What is Wireless (also known as Wi-Fi)? It’s a technology without using wires/cables that we use to connect all of our devices such as computers, tablets, mobile phones, smart TVs, printers, smart watches and others to the internet. It also...
Mobile phone Cyber-attacks – be aware!
Mobile phones have become an integral part of our daily lives, with most people carrying them wherever they go. They are not just communication devices but also store personal and sensitive information such as bank account details, passwords, and personal...
AMP – discover the 1% of threats you have been missing!
In this blog we are going to talk Endpoint security and AMP (Advanced Malware Protection for Endpoints)… Nearly all endpoint security solutions on the market today claim to block 99% of malware, but what about that 1% of threats they...
Top 5 most damaging cyber-attacks of 2022 in the world
Cyber-attacks are showing no sign of slowing down, in this blog we are going to look at the top 5 most damaging cyber-attacks of 2022. Russia vs Ukraine war Organisations that are usually far from having involvement in war have...
MFA (multi-factor authentication) – all you need to know!
What is multi-factor authentication (MFA)? What are some facts? Does it cost a lot? Find out here! Passwords are everywhere, we use them to access everything, our money, on our communications, our apps, our emails, our social media, our files…...