Consulting with a Conscience™

A cruciallogics blog

23 Jun 2022

Cloudy with a Chance of Data Leakage Part II – Protection and Prevention

Data leakages can happen unintentionally, or they can be caused by mal...

27 May 2022

Cloudy with a Chance of Data Leakage Part I - Threats and Impacts

More than 60% of corporate data worldwide is stored in the cloud, and ...

29 Apr 2022

The Death of the Intranet

The days of using just a traditional intranet to post static informati...

13 Mar 2022

8 Reasons to Choose Microsoft Dynamics 365 as Your CRM Solution

Customer Relationship Management (CRM) solutions are data-driven, inte...

21 Feb 2022

The Top 7 Threats in Mobile Device Security

There are more than 4.3 billion active mobile internet users worldwide...

09 Feb 2022

The Importance of Penetration Testing and 6 Reasons Why It Should Be Outsourced

Cybercrime cost the global economy $6 trillion in 2021, up from $3 tri...

07 Jan 2022

4 Future Trends in the Digital World

As IT teams continue to deal with the chaos caused by COVID-19, they a...

08 Dec 2021

Managing Those End Users: Lessons Learned from HyperCare Consultants

While we often talk about the risk associated with hackers and other c...

06 Dec 2021

Hack Me If You Can

Cybercrime is now considered to be the most serious economic and secur...

12 Nov 2021

Identify and Stop Threats with Azure Sentinel and the Power of AI