Tech Blog
What is spoofed email?
We regularly hear about cyberattacks and ransomware hitting businesses. Every day there seems to be another attack in the news. What do all these reports have in common? They almost always reference phishing being the number one point of entry. There is typically a...
4 tips for working from home with Microsoft Teams
This blog outlines four best practices for working from home and using Teams to make your remote work productive. Tips include details on making the most of your virtual meetings, reminders on being inclusive, advice on using chats to collaborate, and information on...
Security Azure Infographic
Securely harness the power of the cloud with Azure Advanced Threat Protection. This infographic outlines how your organization can trust Azure Advanced Threat Protection as it provides real-time security at enterprise scale, detect threats quickly, and allows your...
The leading South African law firm steps up digital innovation to build the legal practice of tomorrow
With over 150 years of history and experience in the legal market, Webber Wentzel has become one of South Africa's most prominent law firms, operating at the forefront of legal services and home to the country's longest-standing pro bono practices. The firm aims to...
Microsoft Teams, the hub for teamwork in Office 365
Employees today are working with twice the number of teams they were just 5 years ago. Part of that change is the evolution of the modern workplace in which workers can freely collaborate and communicate to achieve more and drive profitability. At 5A Tech Consulting,...
These Are The Five Most Dangerous Email Attachments
This article published in Forbes addresses the risks posed by suspicious email attachments. It highlights the five file types attached to the majority of malicious emails and gives tips on how to identify them by file extension. Read More...