How to detect shadow IT and why you should
Find out how, and why it’s important, to detect shadow IT. There’s a business case for allowing employees to innovate, but it needs to be safe.
What is ‘shadow IT’?
Find out exactly what shadow IT is, how it creeps into use by remote workers, its risks, as well as how to mitigate the risks.
Remote workers result in weaker security – the dangers of shadow IT
Remote workers in your business result in weaker security. You might think this is a sweeping statement, but in the recent study The dangers of hidden IT behavior: What we do in the Shadows by NinjaRMM there is overwhelming evidence that in most cases, the presence of remote workers poses a security risk due to ‘shadow IT’.
WordPress hacks – advice and how to stay safe
WordPress, the well-known content management system used to publish websites and blogs has suffered a major security breach. But this isn’t the first time.
Moving to the cloud no longer optional in 2023
Cloud has often been adopted too fast for comfort. The benefits of cloud are undisputed, but what does 2023 hold for businesses’ use of cloud?
Cultrix 2022 IT advice still stands for 2023
In 2022, we had lots of advice to give businesses here in our IT Academy – and most of it, if not all, still stands for 2023. Here’s a rundown of 2022.