Microsoft (MS) Teams is now used by many organizations as the preferred collaboration tool. This comes as no surprise, of course, as the app was specifically developed for hybrid work, making it a perfect fit in a time when employees from different (work) groups increasingly work from various places and at varying times – i.e. asynchronously.
We all know that one of the main challenges of any company in the IT services business is to get that first meeting with a new prospect. What is your unique selling point? What really makes your company stand out from the crowd? Wouldn’t it be great if you had something in your portfolio that opens doors and keeps them open?
Resolve have offered IT support and services within the Yorkshire region of the UK for over 17 years and are renowned for their expertise and award-winning customer service. They chose to partner with QS solutions when their latest bespoke security offering ‘Resolve Cloud Security’ was just getting off the ground.
In the week of December 6th, a critical vulnerability was discovered in Apache Log4J, which is a logging tool used in many Java-based applications. This vulnerability makes it possible for an attacker to remotely exploit this vulnerability and to gain access to the environment. This critical issue requires immediate action.
In a world in which cybersecurity plays an increasingly important role, World Wildlife Fund Deutschland takes a proactive approach in order to always stay one step ahead of possible challenges. In order to uncover any risks and vulnerabilities, it engaged QS solutions to screen their entire company network by means of the Cyber Security Assessment Tool (CSAT).
AMSTERDAM, 28 SEPTEMBER 2021 – Capital A has acquired a stake in QS solutions, a company working with a worldwide partner network of distributors including ALSO, Ingram Micro and Tech Data to sell their proprietary software products: the Cyber Security Assessment Tool (CSAT) and PortalTalk – a Security & Governance add-on for Microsoft Teams. QS solutions also delivers implementation consultancy services for Microsoft Cloud products including Microsoft 365, Azure and Dynamics 365.
Cyber Security means firewalls and penetration tests to most people. The general opinion is that getting these technical aspects sorted out
means a tick in the box for Cyber Security, right? Of course, firewalls and penetration tests are important, but this doesn’t mean that Cyber Security can be taken off the agenda. User activity within the IT infrastructure by administrators, end-users and external partners and customers cannot be ignored. This is where one of the major security risks resides: the end-user taking security risks without even realising that they are doing so.
We worry more and more about our privacy, both in our private and working lives. It’s more important than ever that our data is stored safely and processed with our privacy in mind.
The number of Facebook users who left the social network following a recent breach demonstrates this clearly. In order to prevent this type of infringement, the European Union decided to issue a regulation designed to protect the personal details of European citizens: the GDPR (General Data Protection Regulation) which is in force as of 25th of May 2018. The message being sent by the new regulation is clear: “treat personal data with care’.
Developing an action plan to improve the security of the IT infrastructure is not simple. Where should you get started? What are the priorities? What vulnerabilities are there? IT infrastructure is complex and there are many aspects to be taken into consideration. Your gut-feeling is that improvements can be made but getting hard facts to back that feeling up is time-consuming. There must be a better way!