Layer3 has today announced the launch of its new cloud-based security solution — powered by US security firm, Todyl. The solution, called Secure Anywhere, enables distributed workforces to securely connect …
Server 2012 R2 End of Life
End of Life (EOL) Alert for Windows Server 2012 R2 All good things must come to an end and that end has come for Windows Server 2012 R2. Microsoft have …
The Critical Need for Remediation in Vulnerability Management
A common misconception about cyber security, is that you simply need to buy a product or two to ‘protect your data’. It would be nice if the things worked that …
Layer3 Announces New Office in Wellington CBD
Layer3 is pleased to announce the opening of its new satellite office in Wellington CBD. This step serves as both a reflection of our company growth as well as our …
Why EDR Antivirus Should Be the MVP of Your Security Stack
Are you tired of all the tech jargon surrounding computer security? Not to worry! Today, we’re going to break down why EDR antivirus is the star player of your security …
The Growing Significance of Supply Chain Attacks
As technology continues to advance and organisations become more interconnected, the risks associated with cyber-attacks are on the rise. One type of cyber-attack that has gained significant attention in over …
Layer3 Takeover at Wellington Phoenix Event
This past Saturday’s Wellington Phoenix Football Club Double Header at Sky Stadium was the scene of an ‘Upper Hutt takeover’ as the Upper Hutt City Football Club (UHCF) sent a …
Bigger Brains Course Updates Q1 2023
For customers with access to our training courses, we have some exciting updates for you. From today, you will be able to access the following courses via our portal: 1. …
Microsoft Azure: Controlling Your Cloud Spending
As businesses increasingly rely on cloud services such as Microsoft Azure, it’s crucial to keep spending under control. Azure is a powerful and flexible platform, but without proper oversight, costs …
Microsoft Azure: Hub / Spoke Design
Azure Hub-Spoke Design: The Importance of a Strong Cloud Plan for Businesses As more and more companies shift to the cloud, it becomes increasingly important to have a solid plan …
SASE: The Future of IT Security Without a Firewall
In recent years, there has been a shift in the way organizations approach IT security. Rather than relying on traditional on-premises solutions such as firewalls, many are turning to Secure …
Ransomware. Phishing Breaches. Exploits. Insider Threats.
Ransomware attacks can be devastating for businesses of all sizes. In addition to potentially costing thousands of dollars in ransom payments, these attacks can also disrupt operations and damage a …