Dropbox announces large file transfer utility.

Image of Cloud Computing ICons

As usual for Dropbox, it has managed to execute a very intuitive implementation and interface. Some of the features include: 100 GB of files per transfer Share with anyone the files, no Dropbox account required for the recipient fo the file. Add via drag-and-drop or from Dropbox As simple as copying a link via sending an email A very useful … Read More

Happy New Decade!

We have been blessed with the wonders of technology for many years. Blessed in the interconnections with new people, new cultures, and feats that a few years ago could just be seen as unimaginable and unreachable. Times are changing, faster than ever, and we would like to thank our clients, friends, and family that supported our endeavor in the last … Read More

Gmail / Gsuite update: Send email as attachments in Gmail.

A clever feature, and apparently a widely requested feature, was announced yesterday. Basically it works as this: ” With this new functionality, you can do exactly that. “Sending emails as attachments allows you to write a summary email message to your recipients, and attach the set of supporting emails that recipients can directly open in their mail client. “ Please follow … Read More

Implementing a Microsoft 365 Secure environment. Whitepaper for Business Decision Makers (BDMs)

Image of Cloud Computing ICons

Microsoft has recently published on its 365 Security Site a series of very practical guidelines focused on Business Decision Makers. The guide was written by Kozeta Beam – Microsoft Cloud Security Architect, and Thiagara Sundararaja – Microsoft Senior Consultant. These guidelines urge the customer to “take responsibility to secure your own identities, data and devices used to access cloud services” … Read More

Avoiding focused Spear-Phishing campaigns.

Microsoft’s Security Blog recently published an excellent article covering a growing trend in security attacks. Written by Diana Kelley Cybersecurity Field CTO and Seema Kathuria Senior Manager, Cybersecurity Solutions Group, it cleverly describes spear-phishing campaigns that are highly focused, and successful. These attacks do not target large or broad email lists, but rather a person within an organization. Experienced tech executives and … Read More