Tags

Latest Posts

 

Security

Failure to BCC

Failure to BCC: This one email mistake could cost you millions!

The Sydney Morning Herald recently ran a story on one company’s million-dollar e-mail mishap. Their big blunder? They loaded 300 customer email addresses into the CC: field instead of the BCC: field, and it’s cost them dearly. Find out what the big deal is with BCC! Here’s one universal truth about...
Read More
Dark Web

The Dark Web – The Underbelly of the Internet

Did you know that…when you use a search engine like Google, Bing (or even, dare we say it, Yahoo) you are literally only scratching the surface of the Internet? These common search engines only search 0.4% of the indexed Internet. So, what makes up the remaining 99.96%? Well some of...
Read More
Microsoft End of Life Announcements

Windows 7 & Exchange Server 2010 End of Life – All your options!

What do Microsoft's end of life and end of extended support deadlines for Windows 7 and Windows Exchange Server 2010 mean for you? As the saying goes – all good things must come to an end! Over the next 12-18 months, some core Microsoft products your business may currently rely on...
Read More

Top Five Technology Strategy Trends for NFPs

Our Top Five Technology Strategy Trends for NFPs from Transform 2019! May 8-9, 2019, 500 technology-focused not-for-profit sector representatives amassed at the Melbourne Convention Centre for Connecting Up’s Transform 2019 annual technology conference. Maxsum was proud to support our partner Connecting Up for the second-year running at this peak technology enablement event...
Read More

Defining your approach to mobility (Flexibility vs. Security)

With any tightening of security technologies or practices, there is always going to be a flow-on effect to end users. Today’s super-sophisticated mobile devices and technology platforms give people the power to read, chat, share, view, download, or book pretty much anything in one click or swipe, and pretty much...
Read More
Email and endpoint protection

Next-generation email and endpoint protection – The game has changed!

Want to be able to trust your inbox again? Here’s how!   With next-generation email and endpoint protection, of course! Email and endpoint protection has changed - dramatically! Read on to find out what your business should see as the new normal.  There’s nothing certain in life except for death, taxes….and spam! Ever since email...
Read More

Mobile Device Management: Keeping your data on the downlow

Getting something to “go viral” is undoubtedly the holy grail of social media success! Maximum reach and hopefully maximum impact. Our devices and digital platforms are intuitively designed to help us share, post, communicate and collaborate without limit, but while that maybe be great for your most recent dancing cat...
Read More

Shining a Light on Shadow IT

Are you carefully and strategically planning to make or expand your move into the cloud? STOP right there! There’s something important we think you need to know! No matter what stage of the cloud adoption journey you think you’re at, there’s an 87% chance some of your data is already...
Read More