365labs Blog

Grab a Coffee

 
Understanding the Recent CrowdStrike Issue and the Linux Debate
Paul Barton Paul Barton

Understanding the Recent CrowdStrike Issue and the Linux Debate

The Crowdstrike incident has sparked debates about the reliability of Windows versus Linux in enterprise environments. In this post, we will explore the details of the CrowdStrike issue and critically analyze the argument for switching to Linux as a means of avoiding such problems.

Read More
Improving Remote Team Collaboration
Paul Barton Paul Barton

Improving Remote Team Collaboration

Remote work has become the norm for many organizations. While this shift offers numerous benefits, it also presents unique challenges in maintaining effective communication and collaboration. As businesses continue to navigate the complexities of remote work, it is essential to adopt strategies that enhance team collaboration and ensure productivity remains high. This blog post explores key strategies to foster effective collaboration in remote teams, leveraging technology and best practices.

Read More
How to Efficiently Send Large Volumes of Internal Emails using HVE (Public Preview)
Paul Barton Paul Barton

How to Efficiently Send Large Volumes of Internal Emails using HVE (Public Preview)

A question we frequently get asked is how a business should go about sending out a large volume of internal emails. While traditional services like MailChimp and SendGrid are excellent for marketing campaigns, they are primarily designed for external communications. This is where Microsoft 365's new feature, High Volume Email (HVE), comes into play. Recently launched in public preview, HVE is specifically designed to handle large-scale internal email communications, providing a robust alternative to traditional email services.

Read More
Windows 11's New Recall Feature: A Privacy Nightmare?
Paul Barton Paul Barton

Windows 11's New Recall Feature: A Privacy Nightmare?

Microsoft's latest addition to Windows 11, the Recall feature, has stirred up considerable controversy in the tech community. Promoted as a revolutionary tool for productivity, Recall captures screenshots of your computer activity every few seconds and stores them in a local database. This ambitious integration of AI into daily computing tasks aims to make retrieving past activities as simple as performing a search. However, the potential privacy implications are too significant to ignore.

Read More
Digital-First with an Estonian Company
Paul Barton Paul Barton

Digital-First with an Estonian Company

We work exclusively with digital-first and cloud-first companies, helping them move away from relying on on-premise systems and workflows. Our favourite clients to work with are startups, as a blank canvas allows us to apply the best products from the outset using best practices. When a prospective Digital Marketing Agency (DMA) approached us to set up a brand new agency, we were delighted to help set up their cloud products and create an integrated and secure infrastructure.

Read More
Can Cyber Essentials lead to a false sense of security?
Paul Barton Paul Barton

Can Cyber Essentials lead to a false sense of security?

We explore the intricacies of Cyber Essentials certification in our latest blog article. We delve into the question: Can Cyber Essentials lead to a false sense of security? Discover the foundational principles of Cyber Essentials, its benefits, and potential pitfalls. We debunk common misconceptions surrounding certification and provide practical strategies for mitigating risks and maintaining a balanced security posture. Whether you're considering Cyber Essentials certification or seeking to bolster your cybersecurity defenses, this article offers valuable insights and guidance for navigating the complexities of cybersecurity certification.

Read More
Addressing the Curl Vulnerability: Prompt Patching is Paramount
Paul Barton Paul Barton

Addressing the Curl Vulnerability: Prompt Patching is Paramount

Staying ahead of potential threats is crucial. Recently, the maintainers of the Curl library released an advisory about two security vulnerabilities that were addressed in an update on October 11, 2023. The vulnerabilities were identified with the codes CVE-2023-38545 and CVE-2023-38546, with one being of high severity and the other of low severity.

Read More
We are taking a blogging break!
Paul Barton Paul Barton

We are taking a blogging break!

Expect our return in September, ready to share fresh perspectives and deeper insights. Until then, keep the tech spirit alive! Thank you for your patience.

Read More
SaaSy
Paul Barton Paul Barton

SaaSy

Welcome to 'SaaSy,' where we explore the power of Software as a Service (SaaS). At 365labs, we're proof of the success of a 100% SaaS model. Join us as we share our insights and best practices, demonstrating why we believe the future is SaaSy. Our goal? To guide you in harnessing the full potential of SaaS for efficiency, security, and growth. Stay tuned for an exciting journey into the world of SaaS.

Read More
Should we be using single sign on (SSO)?
Paul Barton Paul Barton

Should we be using single sign on (SSO)?

At 365labs, we prioritize using Single Sign-On (SSO) wherever possible. As a company with a cloud-first strategy, we've entirely moved away from legacy and on-premise systems. Our efficient and secure operations leverage SSO with a range of services, including but not limited to Apple, Google Cloud Platform (GCP), Amazon Web Services (AWS), Alibaba, HubSpot, Adobe, and Zoom.

Read More
Should My Small Business Be Concerned About 'Zero Day' Threats?
Paul Barton Paul Barton

Should My Small Business Be Concerned About 'Zero Day' Threats?

There's a buzzword in the world of cybersecurity that sends shivers down the spines of IT professionals and business owners alike: "Zero Day." Now, as a small business owner, you might be wondering, 'What on Earth is a Zero Day threat, and do I need to be losing sleep over it?”

Read More
Azure Bastion
cloud computing Paul Barton cloud computing Paul Barton

Azure Bastion

Cloud computing has revolutionized the way businesses and individuals store, access, and manage data and applications. As cloud technology continues to evolve rapidly, it is essential for businesses and IT professionals to stay informed about the latest developments and terminologies. In this beginner's guide, we will provide an overview of the fundamental concepts, services, and technologies related to cloud computing.

Read More
A Beginner's Guide to Cloud Computing: Technologies, Services, and Terminologies
cloud computing Paul Barton cloud computing Paul Barton

A Beginner's Guide to Cloud Computing: Technologies, Services, and Terminologies

Cloud computing has revolutionized the way businesses and individuals store, access, and manage data and applications. As cloud technology continues to evolve rapidly, it is essential for businesses and IT professionals to stay informed about the latest developments and terminologies. In this beginner's guide, we will provide an overview of the fundamental concepts, services, and technologies related to cloud computing.

Read More
Does your business rely on 3G?
Paul Barton Paul Barton

Does your business rely on 3G?

The 3G network, which has been a staple of mobile communication for over two decades, is slowly being phased out in favor of faster and more reliable 4G and 5G networks. In the United Kingdom, the country's communications regulator, OFCOM, has announced plans to switch off the 3G network.

Read More
Recovering from Ransomware
Paul Barton Paul Barton

Recovering from Ransomware

Ransomware attacks have become increasingly common in recent years, causing significant damage to businesses of all sizes. A ransomware attack can leave a company’s sensitive data encrypted and inaccessible, preventing employees from performing their duties and severely impacting the organization's operations. Recovering from such an attack can be challenging, but it is possible with the right approach. In this article, we will discuss how a company can recover from a ransomware attack and why paying the ransom is not a good idea.

Read More
Small Businesses That Should be Thinking About Cybersecurity That May Not Be
Paul Barton Paul Barton

Small Businesses That Should be Thinking About Cybersecurity That May Not Be

Cybersecurity is no longer a luxury but a necessity for businesses of all sizes, in all geographies, we focus on the United Kingdom here. The rapid digitalization of various industries has increased the risk of cyberattacks, with small and medium-sized businesses often the most vulnerable. While many organizations understand the importance of cybersecurity, some may not realize how exposed they are.

Read More