Yesterday I was contacted by another IT service provider asking about how to deal with a business email compromise (BEC) which is when a hacker manages to hack into an email inbox. Usually a hacker gains access to a business email, typically a leader in an...
There’s a myriad of networking device vendors and products out there so we took some time to give an overview of the Unifi product line from Ubiquiti. We select and deploy Unifi devices for all our managed services clients and provide free replacement of Unifi...
Hello Everyone, Given that churches in Singapore have the unique challenges of complying with the PDPA, I thought it would be good to put together a quick video pointing out a common issue churches will face when employing a self-checkin solution via their church...
One thing that I’d always wanted to do when running IT in China was to get rid of the horrible telephone exchange PBX units we had. Analogue PBXs are frustrating, they break, and they are these bizarre boxes of mystery that only technicians trained specifically...
Working in IT I regularly bump into misconceptions about RAM. I work with all kinds of systems with various configurations from 128 GB of RAM all the way down to 8 MB or less, and I know that a lot can be done with very little RAM when used properly so I thought...
Last week I talked about integrating badges and church websites. I went ahead and did a quick and dirty build of church website because I wanted people to see a (rough) working example. As I was working on the site, my wife walked into my office and upon seeing my...