Our Blog - Page 4 of 11 - Enablis

You know about Microsoft Teams. But what about Teams Voice?

Posted on: October 29, 2019 | 3 minutes read

One thing that hasn’t been as widely discussed as collaboration is its calling capabilities. Some customers we’ve spoken to believe that there’s only one major Telco in Australia which is able to deliver Microsoft Calling. This isn’t the case, and we’re here to help you investigate your options.

Read more

Can an organisation truly be passwordless? The answer is yes.

Posted on: October 3, 2019 | 3 minutes read

Let’s face it, we’ll all sick of passwords. But can an organisation truly be passwordless? The answer is YES. But what exactly is passwordless?

Read more

What are your options with Microsoft Teams?

Posted on: September 10, 2019 | 3 minutes read

We know that the impending migration to Teams is on every IT manager’s mind. The benefits promised are great – having one centralised location where you can see, collaborate, store and engage. The end-goal is to unify your collaboration workspace and we understand it may be a step-by-step process to get there.

Read more

Crowdstrike’s 2019 Mobile Threat Landscape Report

Posted on: August 21, 2019 | 2 minutes read

It’s undeniable that data security threats are on the rise. Attackers infiltrate even the most guarded organisations through their email (check out the stats on Mimecast’s 2019 State of Email Security Report), their end-points and even directly through their front door by hacking users’ passwords. And maybe you’ve got most of these bases covered. (If you haven’t, do come and talk to us about our Zero Trust Security Framework).  But have you considered mobile security?

Read more

Enablis recognised as a top MSP for the 8th consecutive year

Posted on: August 5, 2019 | 2 minutes read

For the 8th consecutive year, Enablis has been named as one of the world’s premier managed service providers on the prestigious 12th-annual Channel Futures MSP 501 rankings.

Read more

2019 State of Email Security

Posted on: July 25, 2019 | 2 minutes read

Email impersonation attacks, or email fraud, continues to grow, with Mimecast’s 2019 State of Email Security Report showing a 67% increase in attacks compared to 2018. The report finds that 73% of those organisations impacted by impersonation attacks having experienced a direct loss, specifically loss of customers (28%), financial loss (29%) and data loss (40%). Phishing attacks were the most prominent type of cyber attack, with 94% of respondents having experienced phishing and spear phishing attacks in the previous 12 months, and 55% cited seeing an increase in phishing attacks over the same time period.

Read more

Karting around for a good cause

Posted on: July 15, 2019 | 3 minutes read

Last week, Enablis team members congregated at Centennial Park in Sydney for our FY20 kick off. Themed ‘Accelerate’, we weren’t privy to much information beforehand except that there was something race-related ahead, and to dress for the part.

Read more

VIDEO: Is the hype around SD-WAN justified?

Posted on: June 27, 2019 | 1 minute read

The recent increase in security breaches is not a hype and is a real risk to all companies of any size. Hear Enablis Managing Director, Stuart Couchman, talk about the new and evolved types of threats, as well as Enablis’ new methodology – in partnership with market leading vendors – that can help eliminate these threats.

Read more

Top 8 Identity & Access Management Challenges with Your Saas Application

Posted on: June 11, 2019 | 6 minutes read

The enterprise cloud revolution is here. IT organisations everywhere, from small and mid-sized businesses to Fortune 500 companies, are moving from on-premises software to on-demand, cloud-based services. As enterprise IT makes this transition to a new hybrid on-demand/on-premises configuration, controlling who is granted access to which applications becomes increasingly important. This presents CIOs and their teams with a whole new set of identity management challenges. In addition, users must keep track of multiple URLs, user names, and passwords to get access to their applications.

Read more

  • Categories
  • The future of network security is in the cloud - learn about SASE now.