Kevin Howarth
Filter by
Blog
|
1 min read
Security Breach at GoDaddy Exposes Over 1 Million Users
Today, hosting Giant GoDaddy announced that it had been the victim of a severe cybersecurity breach which may well have ...
Read More
Blog
|
4 Min Read
Answering All Your Windows 11 Questions In 2 Minutes
VC3 can help you determine whether Windows 11 is right for your team, and seamlessly migrate your organization to this n...
Read More
Blog
|
5 min read
The Biggest Hidden Red Flags in a Phishing Email
During Cybersecurity Awareness Month, you'll likely hear a lot about the dangers of phishing emails. Many common red fla...
Read More
Blog
|
4 min read
5 Areas Where Information Technology Can Improve Compliance
Compliance. One of those necessary operational activities that you know is working when nothing bad happens.
Read More
Blog
|
4 Min Read
What is Endpoint Detection and Response (EDR)?
Endpoint Detection & Response is a network security tool that continuously monitors your network’s endpoints in real-tim...
Read More
Blog
|
4 min read
Benefits of Auditing Your IT Department
IT auditors often have to spend quite a lot of time persuading businesses that organizing an audit of their IT departmen...
Read More